Skip to content
View lebr0nli's full-sized avatar
😁
==1337==ERROR: AddressSanitizer: stack-buffer-overflow
😁
==1337==ERROR: AddressSanitizer: stack-buffer-overflow

Organizations

@water-paddler

Block or report lebr0nli

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
lebr0nli/README.md

Hi there 🖖

I'm a graduate student in computer and communications security from Taiwan. My most familiar language is Python. I started to play CTF since early 2021, mainly focusing on web challenges, but I also like to solve some pwn and some pyjail/jsjail type challenges :P

I have a small blog written in Chinese here, it is mostly my CTF writeups and some notes.

Pinned Loading

  1. GEP GEP Public

    GEP (GDB Enhanced Prompt) - a GDB plug-in to enhance your GDB with fzf history search, fzf tab auto-completion, fish-like autosuggestions, and more!

    Python 134 10

  2. pwndbg/pwndbg pwndbg/pwndbg Public

    Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

    Python 10.2k 1.2k

  3. 0140454/hackbar 0140454/hackbar Public

    A browser extension for Penetration Testing

    Vue 565 77

  4. PHPFun PHPFun Public

    Write and execute PHP with only 6 different characters: ([.^])

    Python 20 1

  5. david942j/one_gadget david942j/one_gadget Public

    The best tool for finding one gadget RCE in libc.so.6

    Ruby 2.3k 149

  6. My-CTF-Challenges My-CTF-Challenges Public

    Challenges I created for CTF competitions.

    Python 3