Z0F

Security research, development, guides, and more.

Home Twitter Patreon GitHub Blog Resources Reverse Engineering Course

Z0F - Research, courses, and more.

Places

Support Me!

The courses take a long time to make, and I’m working on my own. As the courses get bigger and more complex they become harder to manage and make. On top of making the courses, I have real-life stuff going on. I try to make the courses as high quality, detailed, well structured, and easy to follow as I can. Unfortunately, there is only so much I can do. When working on these courses my motivation can die fast, which is why I need your help! It doesn’t have to be money, it can be something as simple as following me on Twitter. If you do wish to support me monetarily, you can do so via Patreon.

Contact

Twitter: 0xZ0F
Discord Channel: https://discord.com/invite/73tkPGv

If you have any questions, recommendations, or you found an issue, please contact me! I’m not much of a social person, so be patient ;)

About Me

What I Do

I do software reverse engineering, process exploitation, security research, and I teach reverse engineering in my free time.

My skills include Assembly, C/C++, C#, Java, Python, Bash, Powershell, Windows Internals, Reverse Engineering (specifically Windows), Penetration Testing, Red Teaming, and more.

I currently focus my efforts on two things. Both of which I hope will come to the same result.

State of Cybersecurity - Why I Teach

There are plenty of people working on web security, and far too many working in offensive security roles such as penetration testing. What we don’t have enough of is people who find vulnerabilities in the hardware, firmware, software, services, and processes that run the world. What I believe to be the reasoning for this is the difficulty in finding those vulnerabilities. Back in the day all you had to do was find an input field that was vulnerable to a buffer overflow by fuzzing it, but it’s nowhere near that simple anymore and people are leaving because of it. The reason why it’s difficult is because of the lack of education in this field. On top of that, there are many great minds out there with no audience who may try to teach but give up because their voice was lost in the void.

I can confidently state that in 10 far too long years from now, every beginner to intermediate hacker will know what we consider to be advanced now. Why? Not because it will get easier, and not because we will get smarter. Rather, that’s how long it will take for someone with a sizeable audience to finally teach it. Unfortunately, by the time it reaches the greater audience, it will be too late, as the tip of the spear will have moved again.

I hope that I can bring education and research which will help the industry. At the same time, I ask the community to do the same. Create content, create guides, create anything. Together I hope we can protect what we have made.