Pinned Repositories
afl-cgc
CTF
Some of my CTF solutions
CVE-2022-21882
DisableDynamicBase
Small tool to remove IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE Flag from PE Header
IDASignsrch
IDA_Signsrch in Python
LazyIDA
Make your IDA Lazy!
LazyKLEE
Lazy python wrapper of KLEE for solving CTF challenges
NCTU-OSDI
Notepad2048
Play 2048 in notepad.exe
UltraTools
L4ys's Repositories
L4ys/LazyIDA
Make your IDA Lazy!
L4ys/CVE-2022-21882
L4ys/IDASignsrch
IDA_Signsrch in Python
L4ys/CTF
Some of my CTF solutions
L4ys/LazyKLEE
Lazy python wrapper of KLEE for solving CTF challenges
L4ys/DisableDynamicBase
Small tool to remove IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE Flag from PE Header
L4ys/UltraTools
L4ys/NCTU-OSDI
L4ys/CVE-2019-0808
Win32k Exploit by Grant Willcox
L4ys/Disclosures
Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts
L4ys/eBPF_processor
An IDA processor for eBPF bytecode
L4ys/NCTU-Software-Testing
L4ys/NtCall64
Windows NT x64 syscall fuzzer
L4ys/openprocmon
open source process monitor
L4ys/PoC
Proofs-of-concept
L4ys/polarbearrepo
L4ys/Presentation
L4ys/python-windows-driver-loader
A simple python tool and supporting classes for loading/unloading/starting/stopping windows drivers
L4ys/SuperDllHijack
SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技术,不再需要手工导出Dll的函数接口了
L4ys/unicorn_pe
Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.
L4ys/aura
L4ys/blog-comments
L4ys/eBPF-for-Ghidra
eBPF Processor for Ghidra
L4ys/HRAST
PoC of modifying HexRays AST
L4ys/iBoot
iBoot Source Code | Makefile not ran
L4ys/IDR
Interactive Delphi Reconstructor
L4ys/Mirage
kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology
L4ys/pdb
ida pdb plugin with enhance and bugfix
L4ys/redmine_gitlab_hook
This plugin allows you to update your local Git repositories in Redmine when changes have been pushed to GitLab.
L4ys/rsolomakhin.github.io