Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
@0x1CA3
0x1CA3
Follow
View 0x1CA3's full-sized avatar

0x1CA3

Abandoned account.

    Block or report 0x1CA3

    Block user

    Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

    You must be logged in to block users.

    Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
    Report abuse

    Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

    Report abuse
    0x1CA3/README.md
    • 🔭 I mainly know/code/work with:
      • Python
      • C
      • C++
      • Vlang
      • Golang
      • PHP
    • 💻 Languages that I don't code in very much:
      • SQL
      • Javascript
      • x86/x86_64 Assembly
    • 📚 Currently Learning:
      • PE
      • Windows API
      • Reverse Engineering
      • x86/x86_64 Assembly
    • 📱 Interests:
      • IoT
      • Programming
      • Webapp Hacking
      • Malware Analysis
      • Reverse Engineering
      • Exploit Development
      • Malware Development
    • 📫 How to reach me: 835622562742272011 <- [Go onhttps://discord.id/ to get profile information]
    • ⚡ Fun fact: You're probably here because I'm arguing with you.

    Here are some projects to check out.

    • Net - A light-weight, minimal botnet written in C
    • loader - A loader for infecting devices
    • syringe - A DLL & Code Injection C++ library for Windows
    • parasite - An LD_PRELOAD based malware base written in C

    ~ 0x1CA3

    PinnedLoading

    1. AssemblyAssemblyPublic

      I will post x86/x86_64 Assembly code here.

      Assembly 7 3


    [8]ページ先頭

    ©2009-2025 Movatter.jp