Skip to content
View nikaroxanne's full-sized avatar

Highlights

  • Pro
Block or Report

Block or report nikaroxanne

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nikaroxanne/README.md

my artistic process is a daemon process.

reverse engineering | hardware hacking | malware analysis | embedded/IoT security | art

Mastodon: [email protected]

Pinned

  1. supersweet16bit-m4lw4r3 supersweet16bit-m4lw4r3 Public

    Sample COM Programs, Tools for Reverse Engineering and Analysis of MS-DOS malware

    Assembly 5 1

  2. mise-en-abime mise-en-abime Public

    Mise-en-abîme: a technique used in art wherein an image is comprised of recursive copies of itself (a painting within a painting, a play within a play, etc.) This project is an investigation into, …

    Assembly 2 1

  3. h4x0r_toolkit h4x0r_toolkit Public

    A collection of tools/scripts that I use for hacking/CTFs/RE projects, etc.

    Python 1

  4. x86_exorcism x86_exorcism Public

    A collection of x86 programs; contains solutions to exercises from exercism.io, as well as various other programs I've written in x86

    Assembly

  5. art_catalogue art_catalogue Public

    Tools for automating creation of art catalogue

    Python 1

  6. arm_assembly_c_idioms arm_assembly_c_idioms Public

    ARM Assembly Intro Using C Idioms

    C