[go: up one dir, main page]

Skip to content
View ch3rn0byl's full-sized avatar

Highlights

  • Pro

Block or report ch3rn0byl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@jjensn
jjensn jjensn
Passionate about reverse engineering, kernel driver development, automation, game hacking, and exploit development.

ring -2

@dru1d-foofus
Tyler dru1d-foofus
just hacking all the things, but doing a bad job at it

CDW Roanoke, VA

@KelvinMsft
Kelvin KelvinMsft
@microsoft Windows Kernel Engineer

Microsoft Redmond, WA

@kkamagui
Seunghun Han kkamagui
Researcher. Linux Kernel and Debian Contributor. Author of 64-bit multicore OS principles and structure. PGP: 264A 6030 C1BA B4EA 82C3 7F44 E063 7682 4AC5 ABA9

The Affiliated Institute of ETRI South Korea

@GeorgePatsias
UserX GeorgePatsias
Breaking stuff until they work (̿▀̿ ̿Ĺ̯̿̿▀̿ ̿)̄ Cyber Risk Penetration Tester | OSEP | Computer Scientist | Pentester | Malware Developer | Fullstack Dev

Kernel

@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex | 🇺🇦 Ukraine needs your help to kill Ruϟϟian zombies: 🔗 savelife.in.ua/en/donate 💪
@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@deadw0k
deadw0k
I only know cat /etc/passwd

Mars

@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@sad0p
sad0p
Malware Analysis - Systems Programming - Binary Exploitation - Binary Infection
@dtwozero
dTwoZ3r0 dtwozero
i'm a developer/pentester.
@S3V3NsLabs
Christian Wilford S3V3NsLabs
Yo, I been breaking barriers since day one. LOL I'm chasing challenges, learning Python, and pushing limits. WGU Soft-Eng Student, & sweating as I learn off-sec
@matrosov
Alex Matrosov matrosov
IDAholic, #CodeXplorer, @REhints , "Rootkits and Bootkits" book co-author (http://bootkits.io), Firmware voodoo, and TEE exorcist.

BINARLY Los Angeles CA

@K4nj
K4nj K4nj
Enthusiast Security Researcher
@iPower
iPower iPower
Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @thesecretclub.

Mom's basement

@knightmare2600
Knightmare knightmare2600
knightmare@granada[~]$ vlc wia.avi -V aa && nmap -A 0.0.0.0/0 | tee http://nmap.report && vim http://nmap.report

The 80's

@aahmad097
aahmad097
chillin.

@AtredisPartners @AtredisPartners

@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@amzn

@hypervisor
Adrian hypervisor
👨‍💻

Bergen, Norway

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@aryanguenthner
Aryan aryanguenthner

your computer is my other computer

@0xz00n
0xz00n 0xz00n
Hacker | Z Fiend

127.0.0.1

@sdcampbell
Steve Campbell sdcampbell
Pentest consultant team lead

United States

@740i
740i

Unaffiliated

@offensive-security
Offsec offensive-security

OffSec Services Limited