Name: Theodor Arsenij
Type: User
Company: Passware
Bio: 💻 DTU. Security researcher, exploit developer and reverse engineer. Occasionally do Fintech :)
Passionate about mountain biking and studying :smile:
Twitter: m4drat
Location: Denmark, Copenhagen
Blog: https://pwn.report/
Theodor Arsenij's Projects
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools.
Materials for my BSc thesis: "Hybrid Fuzzing of the PyTorch Framework"
two types (external/internal) cheat examples, and game to test on.
This repository provides reference solutions in c++ for the coursera courses on data structures and algorithms
CVE-2013-2028 python exploit
python implementation of different data structures (DoubleLinked list, stack, queue, deque, ...) and algorithms for them
CTF team name generator built upon tensorflow and CTFtime dataset
Writeups for FlareON-9 (2022)
exploits for HEVD
A list of IDA Plugins
Solutions for some problems from leetcode
C++ memory allocator with smart GC
Set of benchmarks for mem++ allocator
OSS-Sydr-Fuzz - OSS-Fuzz fork for hybrid fuzzing (fuzzer+DSE) open source software.
Tensors and Dynamic neural networks in Python with strong GPU acceleration
UNIX-like reverse engineering framework and command-line toolset.
Just a repo with a lot of different binaries used as a rizin fuzz corpus
Benchmarks for our memory allocator
🎥 Slides for talks I gave
Simple shoot 'em up/bullet hell game based on libgdx (java).
Simple rest server to work with space shooter (global scoreboard)
A Trace Explorer for Reverse Engineers
Dumper utility for Samsung's upload mode