Skip to content
View 0xricksanchez's full-sized avatar
πŸ”₯
debugging life
πŸ”₯
debugging life

Highlights

  • Pro

Block or report 0xricksanchez

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xricksanchez/README.md

πŸ’« About Me:

πŸ”­ I’m working on finding vulnerabilities and securing systems..
🌱 My self-improvement goal for 2023 is to further learn how to tame the Linux Kernel and find ways to break it
βš™οΈ I'm trying to stay on top of the fuzzing game
πŸ’‘ I'd love to finish an in-depth educational fuzzer next
πŸ‘― Happy to collab on any cool fuzzing/exploitation ideas!
πŸ“š Always trying to make time to blog about my infosec experiences

🌐 Socials:

X
BSKY
Mastodon
Protonmail
Discord

πŸ’» Tech Stack:

C Rust Python C++ Shell Script Go Docker Neovim

πŸ“Š GitHub Stats:


πŸ’° You can support me by buying me a coffee :)!

BuyMeACoffee

Pinned Loading

  1. paper_collection paper_collection Public

    Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read

    1.2k 123

  2. like-dbg like-dbg Public

    Fully dockerized Linux kernel debugging environment

    Python 739 60

  3. fisy-fuzz fisy-fuzz Public

    This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.

    Python 143 24

  4. dlink-decrypt dlink-decrypt Public

    D-Link firmware decryption PoC

    C 172 45

  5. AFL_Runner AFL_Runner Public

    Scaling best-practice AFLPlusPlus fuzzing campaigns made easy

    Rust 52 9

  6. ipq40xx_tee_exploit ipq40xx_tee_exploit Public

    ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit

    C 6