mavlevin
Student at Stanford focusing on Blockchain Security with a background in 0day vulnerability research and computer exploit development
student at Stanford127.0.0.1
Pinned Repositories
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Blogger-To-Markdown
Convert your Blogger posts to markdown for use with Ghost, Jekyll, and more. Created out of frustration other implementations simply don't work or have 1e25 dependencies. This implementation works and has ZERO external dependencies.
CVE-2019-12181
LPE Exploit For CVE-2019-12181 (Serv-U FTP 15.1.6)
CVE-2019-17424
RCE Exploit For CVE-2019-17424 (nipper-ng 0.11.10)
D-Link-CVE-2021-27342-exploit
Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)
DisableDynamicLoadAddress
Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debug runs
Running-Arbitrary-Functions-In-Exes
Code and compiled executables to go along with my blog post about calling arbitrary functions from EXEs just like DLLs
SetImageFileIsDLL
set the IMAGE_FILE_DLL flag on a Windows PE file
SourceCodeVisualizer
Visualize how a projects source code is distributed among its files and folders
uTorrent-CVE-2020-8437
Exploit for uTorrent vulnerability CVE-2020-8437 by whtaguy
mavlevin's Repositories
mavlevin/SourceCodeVisualizer
Visualize how a projects source code is distributed among its files and folders
mavlevin/DisableDynamicLoadAddress
Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debug runs
mavlevin/D-Link-CVE-2021-27342-exploit
Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)
mavlevin/uTorrent-CVE-2020-8437
Exploit for uTorrent vulnerability CVE-2020-8437 by whtaguy
mavlevin/SetImageFileIsDLL
set the IMAGE_FILE_DLL flag on a Windows PE file
mavlevin/CVE-2019-12181
LPE Exploit For CVE-2019-12181 (Serv-U FTP 15.1.6)
mavlevin/Running-Arbitrary-Functions-In-Exes
Code and compiled executables to go along with my blog post about calling arbitrary functions from EXEs just like DLLs
mavlevin/Blogger-To-Markdown
Convert your Blogger posts to markdown for use with Ghost, Jekyll, and more. Created out of frustration other implementations simply don't work or have 1e25 dependencies. This implementation works and has ZERO external dependencies.
mavlevin/CVE-2019-17424
RCE Exploit For CVE-2019-17424 (nipper-ng 0.11.10)
mavlevin/KernelDriverAddressDumper
Dumps the driver filename, loaded base address and size of loaded Windows kernel drivers
mavlevin/einsteinsriddle
brute forcing einsteins zebra riddle
mavlevin/Integer-overflow-exercises
Integer overflow exercises for Stanford ZERO.
mavlevin/mavlevin.github.io
mavlevin/PictureBackup
Backup pictures from a computer to an external memory drive
mavlevin/pingsing
Audible ping and pong sound on successful ICMP echo request/response.
mavlevin/ShellcodeUtility
compile, test, and execute shellcode (made specifically for CyberQueens lesson 11)
mavlevin/speech-to-latex
CS 229 Project of transcribing latex from scpeech!
mavlevin/WhenWhereBywho
Program that logs when + from where + by who it was run
mavlevin/breaking-operating-assumptions
Stanford 0day hacking team breaking operating assumptions
mavlevin/Deep-Learning-Vision-On-Food
Using deep learning for computer vision to predict restaurant's ratings based on pictures of their food
mavlevin/fast-math
Test and train your fast math skills.
mavlevin/fun-logic-vulnerabilities
mavlevin/Fuzzing-basics
Stanford ZERO
mavlevin/guywhataguy
mavlevin/jamesbond
code to play a life like version of the load/defend/shoot game
mavlevin/keyboardleds
mavlevin/SimpleMathTraining
Train your arthmatic skills by solving simple math exercises. I counldn't find what I was lookig for online so I decided to make this.
mavlevin/slither
Static Analyzer for Solidity
mavlevin/testsite
mavlevin/trustlab-qs