Skip to content
View KaztoRay's full-sized avatar
:copilot:
πŸ’« Reverser, Webhacker, AI Developer, AI Security Engineer, LLM Engineer,... πŸ’«
:copilot:
πŸ’« Reverser, Webhacker, AI Developer, AI Security Engineer, LLM Engineer,... πŸ’«

Organizations

@Ordinal-Lab

Block or report KaztoRay

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
KaztoRay/README.md

trophy

πŸ’« Reverser, Webhacker, AI Developer, AI Security Researcher, Security Engineer, FullStack Developer, CTF Player, Bug Hunter. πŸ’«

venom

KaztoRay's GitHub Stats GitHub Streak KaztoRay's github activity graph


μ œκ°€ κ³΅λΆ€ν•˜λŠ” λΆ„μ•ΌλŠ” μ•„λž˜μ™€ κ°™μŠ΅λ‹ˆλ‹€.

Reversing, Malware Analysis, Webhacking, Black-Box Penetration Testing with PETS, Smart Contract Hacking, Mobile Application Hacking, Pwnable, OS Kernel Exploit (Linux, Windows,...), OS 0day & 1day Vulnerability Analysis, Connected Car Hacking, Windows Kernel Hacking, Windows Driver Hacking, Linux Kernel Hacking, Linux Driver Hacking, Mac OS Kernel Hacking, Mac OS Driver Hacking, Android Kernel Hacking, IOS Kernel Hacking, ARM Based System Hacking, Hyper-V Machine Hacking, Hyper-V Infra Hacking, CPU Vulnerability Hacking, Game Hacking, Network Hacking, Glibc Based System Hacking, Embedded Hacking, Hardware Hacking, Firmware Hacking, IOT Hacking, ICS Hacking, Artificial Intelligence Hacking, LLM Hacking, Artificial Intelligence Security Software Development, Machine Learning based Security Software Development, Deep Learning based Security Software Development, Windows Security Kernel Software Development, Linux Security Kernel Software Development, Mac OS Security Kernel Software Development, Cryptography, System Secure Coding, System Fuzzing Tool Development, Web Secure Coding, Web Fuzzing Tool Development, Web3 Secure Coding, Web3 Fuzzing Tool Development, Cloud Secure Coding, Cloud Fuzzing Tool Development, Machine Learning based Secure Coding, Machine Learning based Fuzzing Tool Development, Deep Learning based Secure Coding, Deep Learning based Fuzzing Tool Development, Cloud Infra Security (AWS, Azure, GCP,...) Kubernetes Security Audit, Server Infra Security, Artificial Intelligence Development, Machine Learning Development, Deep Learning Development, LLM Development (LangChain), NLP Development, OS Kernel Development, Yocto based Embedded Linux Development, Embedded Development, Artificial Intelligence Development, Windows Kernel Software Development, Windows Software Development, Linux Software Development, Network Programming, Front-end Development, Back-end Development, Smart Contract Development, Hyperledger Fabric Development,.....

πŸ›  Server Skills

dell HP supermicro huawei cisco arista intel amd vmware windowssever ubuntu Kali Linux kubernetes docker

Pinned Loading

  1. CommitTimes CommitTimes
    1
    🌞 Morning     8 commits  β–ˆβ–‹β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘   8.3%
    2
    πŸŒ† Daytime    25 commits  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘  26.0%
    3
    πŸŒƒ Evening    40 commits  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–Šβ–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘  41.7%
    4
    πŸŒ™ Night      23 commits  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘  24.0%
  2. Anti-Signature Anti-Signature Public archive

    Anti-SignatureλŠ” 파일의 무결성을 κ²€μ‚¬ν•˜κ³ , λžœμ„¬μ›¨μ–΄ 감염을 νƒμ§€ν•˜λ©°, μ‹€ν–‰ νŒŒμΌμ— λŒ€ν•œ 기본적인 μ•ˆν‹°-디버깅 κΈ°μˆ μ„ μ μš©ν•˜λŠ” λ“± λ‹€μ–‘ν•œ λ³΄μ•ˆ κΈ°λŠ₯을 μ œκ³΅ν•˜λŠ” 파이썬 기반의 μ»€λ§¨λ“œ 라인 λ„κ΅¬μž…λ‹ˆλ‹€. λ˜ν•œ, λ„€νŠΈμ›Œν¬ νŠΈλž˜ν”½μ„ λͺ¨λ‹ˆν„°λ§ν•˜μ—¬ μ•…μ„± νŒ¨ν‚·μ„ νƒμ§€ν•˜κ³  λͺ¨λ“  ν™œλ™μ„ λ°μ΄ν„°λ² μ΄μŠ€μ— κΈ°λ‘ν•˜μ—¬ λ³΄κ³ μ„œλ₯Ό 생성할 수 μžˆμŠ΅λ‹ˆλ‹€.

    Python 16 1

  3. Trailblazer-Fuzzer Trailblazer-Fuzzer Public archive

    Trailblazer FuzzerλŠ” κ³ κΈ‰ λ³΄μ•ˆ 뢄석 및 λ°©μ–΄ μ‹œμŠ€ν…œμœΌλ‘œ, λžœμ„¬μ›¨μ–΄ 보호, 컀널 λ³΄μ•ˆ 뢄석, λ°”μ΄λ„ˆλ¦¬ 보호 기법 확인, κ³ κΈ‰ 퍼징 κΈ°λŠ₯을 ν†΅ν•©μ μœΌλ‘œ μ œκ³΅ν•˜λŠ” λ‹€λͺ©μ  λ³΄μ•ˆ λ„κ΅¬μž…λ‹ˆλ‹€.

    Python 4

  4. Kazto-Vulnerable-Drivers Kazto-Vulnerable-Drivers Public archive

    ν•΄λ‹Ή μ €μž₯μ†ŒλŠ” λ³΄μ•ˆ 연ꡬ 및 ꡐ윑 λͺ©μ μœΌλ‘œ μ œμž‘λœ μ·¨μ•½ν•œ Windows 컀널 λ“œλΌμ΄λ²„ λͺ¨μŒμž…λ‹ˆλ‹€. 각 λ“œλΌμ΄λ²„λŠ” νŠΉμ • μœ ν˜•μ˜ 컀널 취약점을 ν¬ν•¨ν•˜κ³  μžˆμ–΄, 퍼징, μ΅μŠ€ν”Œλ‘œμž‡ 개발, 컀널 디버깅 ν•™μŠ΅μ— μ ν•©ν•©λ‹ˆλ‹€.

    C 1

  5. Cardinal-C2-Framework Cardinal-C2-Framework Public

    Cardinal C2 Framework is a comprehensive Command & Control system specifically designed for penetration testing legacy Windows environments. It provides a modern, Cobalt Strike-inspired interface w…

    C 1 1

  6. KaztoLLM KaztoLLM Public

    Kazto's Security LLM Model Deep Learning Project - Ollama

    Python