Skip to content
View ke0z's full-sized avatar
๐Ÿ“ˆ
Changing
๐Ÿ“ˆ
Changing

Block or report ke0z

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
ke0z/README.md
  • ๐Ÿ‘‹ Hi, Iโ€™m @ke0z , twitter @ke_0z
  • ๐Ÿ‘€ Iโ€™m interested in Dynamic Binary Analysis, Reverse Engineering, Windows Vulnerability Research & Exploit Development, Bug Bounty
  • ๐ŸŒฑ Iโ€™m currently learning Windows Internals
  • ๐Ÿ’ž๏ธ Iโ€™m looking to collaborate on anything above
  • ๐Ÿ“ซ How to reach me (My Twitter)

Popular repositories Loading

  1. VulChatGPT VulChatGPT Public

    Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries

    Python 352 25

  2. IDA-Wine IDA-Wine Public

    IDA PRO patched Dlls to work with wine + Python (for plugins)

    8 1

  3. ctftime_pwn ctftime_pwn Public

    All PWN-oriented (X-DEV/RE) CTFs from https://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs

    7 1

  4. exploit_me_arm_solutions exploit_me_arm_solutions Public

    https://github.com/bkerler/exploit_me solving using Qiling, GDB(pwndbg), IDA Pro

    Python 3

  5. HookThatBin HookThatBin Public

    A Binary/Malware hooker

    C# 2 1

  6. ke0z ke0z Public

    Config files for my GitHub profile.

    1