Skip to content
View NotoriousRebel's full-sized avatar
👌
Work smarter not harder
👌
Work smarter not harder

Block or report NotoriousRebel

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@pathtofile
pat_h/to/file pathtofile
path@tofile.dev

Australia

@sw33tLie
sw33tLie
Bug bounty hunter and CS student.

Italy

@elder-plinius
pliny elder-plinius
latent space liberator; steward of BASI !insert_divider: •-•-•-•-<|L/O\V/E\/P\L/I\N/Y|>-•-•-•-• {GODMODE:ENABLED}

Pliny the Prompter

@monoxgas
Nick Landers monoxgas

@dreadnode Utah, United States

@dreadnode
dreadnode dreadnode
AI Red Teaming | Research. Tooling. Evals. Cyber range.
@b33f00d
Raul b33f00d
RedTeamer

Space Dynamics Co. Earth

@n0kovo
n0kovo n0kovo
Jack of all trades - master of some. InfoSec blog: https://n0kovo.github.io/

Denmark

@winterknife
winterknife winterknife
low-level developer with a focus on 𝙸𝚗𝚝𝚎𝚕 𝚡𝟾𝟼 ISA devices running 𝚆𝚒𝚗𝚍𝚘𝚠𝚜

Coruscant

@trickster0
trickster0 trickster0
Lead Red Teamer & Malware Dev, Reverse engineering for fun and analyzing Winternals

Greece

@six2dez
six2dez six2dez
Ethical hacker, bash lover, foss rulz!

Spain

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@secretsquirrel
midnite_runr secretsquirrel
I laugh in the general direction of security products.
@jacob-baines
Jacob Baines jacob-baines
Reverse Engineer & Programmer

Suburban Philadelphia

@AvivShabtay
Aviv Shabtay AvivShabtay
Researcher, RE, C & C++, Windows Driver Development and more :-)
@cedowens
Cedric Owens cedowens
offensive security engineer
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@jackullrich
jackullrich
winternl.com
@BinaryScary
Samuel Wong BinaryScary
All my good code is hiding from defender on gitlab

Darkpoint Security

@med0x2e
Mohamed El Azaar med0x2e
RedTeamer & Security Researcher, used to be a Software Engineer/Developer, Manga/Anime Otaku

Yo. 127.0.0.1

@EgeBalci
Ege Balcı EgeBalci
Security Researcher

PRODAFT Den Haag, Netherlands

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@EdOverflow
EdOverflow EdOverflow
Web developer & security researcher.

::1

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@opsdisk
opsdisk opsdisk
I love building at the intersection of infosec, Python, automation, and APIs. SSH tunnels are cool too. Collaboration account is @derpadoo
@awgh
awgh
https://www.symbolcrash.com

Symbol Crash

@degenerat3
Jim Maskelony degenerat3
Security Engineer | RIT Alum
@byt3bl33d3r
Marcello byt3bl33d3r
T H I C C M A L W A R E

Palo Alto Networks Error: Unable to resolve

@aleenzz
404 aleenzz
独立美团众包安全配送员
@jessefmoore
Jesse Moore jessefmoore
Sr. Cybersecurity Advisor @ University of Washington. Interested in teaching Admins about Red Team, Forensics, Detection, and defense/secure configs.

Bothell, WA

@matterpreter
Matt Hand matterpreter
Aut viam inveniam aut faciam

@preludeorg USA

@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator