Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@reloc2
reloc2
Follow
你若慕名而来,定会失望而归。
  • Metaverse
  • Hangchow
  • 01:21 (UTC +08:00)
  • X @re1oc2

Block or report reloc2

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
reloc2 /README.md

About me

Hi, I'm reloc2

  • low level reverse engineer :)
  • moviegoer

Pinned Loading

  1. malware-analysis malware-analysis Public

    malware-analysis

  2. malware-development malware-development Public

    malware-development

    C++

  3. commando-vm commando-vm Public

    Forked from mandiant/commando-vm

    Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com

    PowerShell

  4. flare-vm flare-vm Public

    Forked from mandiant/flare-vm

    A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

    PowerShell

  5. exploit-db exploit-db Public

    exploit-db

AltStyle によって変換されたページ (->オリジナル) /