[go: up one dir, main page]

Skip to content
View shantanu561993's full-sized avatar

Block or report shantanu561993

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@navsec
navsec navsec
Security and Vulnerability Research ⚔️ https://www.navsec.net
@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@waawaa
Alejandro Pinna waawaa
Offensive Security Researcher at SentinelOne

Madrid, Spain

@TrebledJ
Johnathan TrebledJ
Programming fanatic. Amateur bedroom composer. Pineapple-on-pizza lover.

Hong Kong

@coffinxp
coffin coffinxp
Security Researcher

moscow

@zyn3rgy
Nick Powers zyn3rgy
Adversary Simulation @ SpecterOps

SpecterOps

@SpecterOps
SpecterOps SpecterOps

United States of America

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@Ap3x
Ap3x

United States

@lem0nSec
Angelo Frasca Caccia lem0nSec
Windows Security Researcher

Italy

@ThunderJie
ThunderJie
Windows Kernel | Blackhat 2022 | MSRC 2022 Q3 TOP 100

China

@jschicht
Joakim Schicht jschicht
Researcher and Forensic Analyst

Norway, Bergen

@dreadnode
dreadnode dreadnode
AI Red Teaming | Research. Tooling. Evals. Cyber range.
@BlackSnufkin
BlackSnufkin
Red Team | Malware Dev
@joaoviictorti
João Victor joaoviictorti
I hack things

127.0.0.1

@icyguider
icyguider icyguider
It's sipple out there!
@INotGreen
NoGreen INotGreen
红队开发人员

Hong Kong, China

@Whitecat18
Smukx ♠ Whitecat18
Offensive code writer. 20 y/o.

0.0.0.0 127.0.0.1

@nvn1729
nvn1729

Horizon3.AI

@nickvourd
Nikos Vourdas nickvourd
Just your friendly neighborhood red Power Ranger:~# OSWE | OSEP | OSCP | OSWP | CRTL | CRTO | OASP

EY US Chicago, IL

@BC-SECURITY
BC Security BC-SECURITY
Cybersecurity Engineers and Offensive Security enthusiasts actively maintaining/updating Powershell Empire in our spare time.
@0xeb
Elias Bachaalany 0xeb
** YouTuber ** Author: Batchography ** Co-author: Practical Reverse Engineering & Antivirus Hacker's Handbook.
@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Beijing

@hackerhouse-opensource
Hacker House hackerhouse-opensource
Hacker House public computer security research.

hackerhouse 0.0.0.0/0

@ambionics
Ambionics Security ambionics
Offensive & Continuous Web Security Assessment
@laplab
Nikita Lapkov laplab
Low-level Rust engineer

@cloudflare London, UK

@tanc7
C. Tan tanc7
Accounting Degree Holder, going for a second degree in Finance at UNLV. Four-time winner of National Cyber League Individuals and Team. Malware Development

Lister Unlimited Las Vegas

@Wh04m1001
Filip Dragović Wh04m1001
OSCP,OSEP,CRTO,CRTP,CRTE,PACES
@CodeXTF2
CodeX CodeXTF2
Red teamer and offensive dev. I pop shells and play tf2.

im in school lol userland

@TROUBLE-1
Raunak TROUBLE-1
Raunak Parmar is an information security professional whose areas of interest include web penetration testing, Azure/AWS security, code review, and scripting.

India

@noperator
noperator

@BishopFox

@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@ybdt
ybdt ybdt
a guy who likes hack a lot

China

@Sn0wAlice
Alice Snow Sn0wAlice
Ne perds pas ton temps à regarder ma vie, utilise le plutôt pour arranger la tienne 🎐

@wonderland-lu Luxembourg

@topotam
Topotam topotam
All I know is that I know nothing. I like Windows, Active Directory and IoT/Hardware hacking.

Discreetly in your network

@jhftss
Mickey Jin jhftss
Exploring the world with my sword of debugger :)

Independent Researcher

@timwhitez
TimWhite timwhitez
Offensive Security Researcher / Vuln Hunter.

@bytedance