(Translated by https://www.hiragana.jp/)
0x44F (0x44F) · GitHub
Skip to content
View 0x44F's full-sized avatar
🦾
🦾
  • China

Block or report 0x44F

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0x44F/README.md

0x44F

Developer of 7 years, many talents that include extensive knowledge on topics such as deep learning, high -> low level programming and kernel level reverse engineering.

About Me

My real name I will not state due to privacy and safety reasons, I will however tell you about what I know, what I've done and how far i've come.

Current experience

I have worked on exe-joiner (popular software) and I have many years experience developing
web and hardware exploitation software. More recently I worked on an Apex Legends cheat p2c
with a friend 0xfaer.

Blog

https://0x44F.github.io

Contact me

Pinned Loading

  1. exejoiner exejoiner Public

    💾 Exe-Joiner (without FUD methods or GUI)

    C++ 18 5

  2. otax otax Public

    "Otax", a popularized shitty discord zero-day exploit. A bullshit writeup on it was released by a larper called HellSec.

    Python 23 7