[go: up one dir, main page]

Skip to content
View epichoxha's full-sized avatar
  • ::1

Block or report epichoxha

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@0xTriboulet
Steve S. 0xTriboulet
All code, software, writeups, and resources of any kind made available on my profile are under the AGPLv3 license unless otherwise noted.
@0xflux
F L U X 0xflux
Red Teamer. Passionate about cyber - low level, malware & systems. Keeping most projects private. ✅ ETHICAL ONLY ✅

North West, England

@b1tg
b1tg
know your stuff
@joaoviictorti
João Victor joaoviictorti
I hack things

127.0.0.1

@memN0ps
memN0ps

New Zealand

@safedv
safedv safedv
Red Teamer

Deloitte 0.0.0.0

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@9emin1
9emin1
haaaackkkk the planet.

singapore

@Hackcraft-Labs
Hackcraft Hackcraft-Labs
Crafting Artful Attacks

Greece

@optiv
Optiv Source Zero optiv
Optiv Source Zero provides research, tools and resources for the innovative cybersecurity community. Part of Optiv.

Global

@maldevel
maldevel maldevel
code, pentests, redteaming, research

@Logisek Greece

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(x(x_(x_x(O_o)x_x)_x)x)

@eksperience
Alexandros Vavakos eksperience
Luck is what happens when preparation meets opportunity.

@nettitude Athens, Greece

@tomnomnom
Tom Hudson tomnomnom
Open-source tool maker, trainer, talker, fixer, eater, not really a sheep. He/him.

sbtUK Yorkshire, UK

@rvrsh3ll
Steve Borosh rvrsh3ll
I hack code together and hope it works.

https://futuresec.io Gamma Quadrant 4

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@Cn33liz
Cn33liz Cn33liz

Groningen, the Netherlands

@hausec
Hausec hausec
script kiddie extraordinaire

@haus3c

@DimopoulosElias
gweeperx DimopoulosElias

https://twitter.com/gweeperx/

@grugq
thaddeus t. grugq grugq

Independent Security Researcher Thailand

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@nonameyo
nonameyo

Error: Unable to resolve Error: Unable to resolve

@phra
Francesco Soncina phra
OSCE // OSCP // Ethical Hacker & Red Teamer // Full Stack Developer // JavaScript Enthusiast // Staff Member of @BolognaJS // CTF player at @d0nkeys

@d0nkeys @BolognaJS Amsterdam, NL

@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@Matir
David Tomaschik Matir
Security Engineer @google Red Team. Security Researcher. Hardware Maker.

@google