Block or report user
  • https://twitter.com/nanotechz9l
  • https://0xbugs.blogspot.com

Organizations

@Vulnerability-Research-Team @penetration-testing-execution-standard

Popular repositories

  1. Source-code-analyzer

    Automatically scan C/C++ source code for known vulnerabilities, and the use of dangerous functions.

    Ruby 5 3

  2. Codecademy

    My scripts from "http://www.codecademy.com/"

    Ruby 4 5

  3. Win32-Exploit-Dev-quiz-engine

    Win32 Exploit Dev Theory | an interactive memorization quiz engine

    Ruby 1 1

  4. mega_millions

    A simple mega millions + mega number generator.

    Ruby 1

  5. MALWARE

    Malicious files for de-obfuscation efforts, and historical ref only.

    Visual Basic 1 2

  6. Corelan-Exploit-tutorial-part-1-Stack-Based-Overflows

    All exploits used in Corelans tutorial part 1 have been ported to Ruby & have been verified do give up a shell.

    Ruby 1

11 contributions in the last year

Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mon Wed Fri

Contribution activity First pull request First issue First repository Joined GitHub

February 2017

nanotechz9l has no activity yet for this period.

January 2017

Created an issue in cea-sec/ivre that received 1 comment

Implement authentication and user role based access.

Please implement user authentication, role based access and AD. Currently anyone hat hits the page can see every scan result. This is no bueno on r…

Seeing something unexpected? Take a look at the GitHub profile guide.