Skip to content
🎯
deadlocking the reality
🎯
deadlocking the reality

Organizations

@trailofbits @pwndbg @JustHitTheCore @justcatthefish

Pinned

  1. Exploit Development and Reverse Engineering with GDB Made Easy

    Python 2.9k 441

  2. Symbolic execution tool

    Python 2k 286

  3. Static Analyzer for Solidity

    Python 478 123

  4. "Reverse-me" aka "I hate portals" challenge made for Python Challenges 2018 competition that was held at PyCon PL 2018.

    Python 9 1

  5. Small crackme game

    C++ 17 7

  6. Genetic algorithm written in C++ for a university course project.

    C++

Contribution activity

July 2020

Created a pull request in pwndbg/pwndbg that received 1 comment

Fix disasm call target display when symbol is known

This commit fixes the issue described in #772 (comment) tl;dr: when we displayed a known constant call instruction like call qword ptr [rip + 0x1c7d2]

+2 −4 1 comment

Created an issue in aquynh/capstone that received 1 comment

Python API __repr__ printers for more objects

It would be nice to have __repr__ in more (or all) Python classes, e.g., operand displays could have more useful repr than just: <capstone.x86.X86O…

1 comment
3 contributions in private repositories Jul 1

Seeing something unexpected? Take a look at the GitHub profile guide.

You can’t perform that action at this time.