Skip to content
View 0xricksanchez's full-sized avatar
πŸ”₯
debugging life
πŸ”₯
debugging life

Highlights

  • Pro

Block or report 0xricksanchez

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xricksanchez/README.md

πŸ’« About Me:

πŸ”­ I’m working on finding vulnerabilities and securing systems..
🌱 My self-improvement goal for 2023 is to further learn how to tame the Linux Kernel and find ways to break it
βš™οΈ I'm trying to stay on top of the fuzzing game
πŸ’‘ I'd love to finish an in-depth educational fuzzer next
πŸ‘― Happy to collab on any cool fuzzing/exploitation ideas!
πŸ“š Always trying to make time to blog about my infosec experiences

🌐 Socials:

X
BSKY
Mastodon
Protonmail
Discord

πŸ’» Tech Stack:

C Rust Python C++ Shell Script Go Docker Neovim

πŸ“Š GitHub Stats:


πŸ’° You can support me by buying me a coffee :)!

BuyMeACoffee

Pinned Loading

  1. paper_collection paper_collection Public

    Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read

    Python 1.3k 127

  2. like-dbg like-dbg Public

    Fully dockerized Linux kernel debugging environment

    Python 754 61

  3. fisy-fuzz fisy-fuzz Public

    This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.

    Python 147 23

  4. dlink-decrypt dlink-decrypt Public

    D-Link firmware decryption PoC

    C 184 46

  5. AFL_Runner AFL_Runner Public

    Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more

    Rust 67 11

  6. ipq40xx_tee_exploit ipq40xx_tee_exploit Public

    ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit

    C 16 1