I'm Zion Leonahenahe Basque or rather mahaloz. I'm a Ph.D. student studying computer security at the SEFCOM Lab at ASU. My research area is broadly binary analysis, but my favorite topic is decompilation. You can find my publications on Google Scholar and my technical blog at mahaloz.re. I’m also a previous co-captain of the hacking team Shellphish. Most of the code you'll find here is reverse engineering tools, research projects made public, or CTF education material.
Here is a pick of my favorite projects:
- Decompilation: 🔬
- Reversing: ⏪
- Debugging: 🐟
- Education: 📖
Stars | T | Description |
---|---|---|
🔬 | sailr-eval is a decompiler-quality evaluation pipeline from the USENIX 2024 paper SAILR. It also contains info on finding artifacts for the SAILR algorithm. | |
🔬 | angr is a binary analysis framework used for a variety of tasks, including decompilation. I'm one of the core developers of the home-rolled decompiler. I focus on making the generated code better. | |
🐟 | decomp2dbg is an addon to GDB to sync decompilation, symbols, and metadata from a decompiler on-the-fly for the enhanced debugging of binaries. | |
🔬 | DAILA is a decompiler-agnostic plugin for integrating AI into decompilation. Currently, OpenAI and the VarBERT models are supported for various reversing tasks, like variable renaming. | |
⏪ | BinSync is a decompiler-agnostic reversing plugin for cross-decompiler collaboration, built on git. Gone are the days of being unable to sync structs and types between different decompilers! | |
⏪ | angr-management is the angr team self-rolled decompiler UI, which includes many plugins for interacting with the binary on multiple levels. Try it out today! | |
📖 | 'ike is a prerequisite handbook for binary analysis written as a guide to prepare people new to computer science for pwn.college, an automated binary exploitation teaching platform. Full site at ike.mahaloz.re. |
If you want to get ahold of me, you can email me at mahaloz@asu.edu
or find me on Discord: @mahaloz and Twitter: @mahal0z.