Skip to content
View Dharani-sanjaiy's full-sized avatar
:octocat:
Time Travelling..
:octocat:
Time Travelling..

Block or report Dharani-sanjaiy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@clearbluejar
clearbluejar

@clearseclabs

@zeze-zeze
Zeze zeze-zeze

TeamT5 Taiwan

@chainreactors
chainreactors chainreactors
for red team! for offensive infrastructure! for future!
@Sh0ckFR
Sh0ckFR
Red Team Operator

Somewhere in Space

@tijme
Tijme Gommers tijme
Adversary Simulation - TIBER - ART - Red Teaming

@ABNAMRO The Netherlands

@XaFF-XaFF
XaFF XaFF-XaFF
Expert @ Googling stuff

Poland

@DErDYAST1R
DErDYAST1R DErDYAST1R
I just upload whatever is useless to my github. Everything here is a concept not a fully working 100% top of the line project, just simple things I do on/off.

Authority (SMG) Modding Software & Predator Systems Modding Software. Красногвардейск, Крым, РФ

@repnz
Ori Damari repnz
windows kernel research & development

0x7c00

@susMdT
Dylan Tran susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman Ex-CPTC & Ex-CCDC @cpp-cyber

IBM X-Force Red Adversary Simulation Building 98C, 4-23: Telco Lab @ CPP

@pulpocaminante
pulpocaminante
Reverse engineer, obscure windows subsystem archaeologist, agent of chaos
@thezdi
The Zero Day Initiative thezdi
The Zero Day Initiative, Trend Micro Inc., founded by TippingPoint, is a program for rewarding security researchers for responsibly disclosing vulnerabilities

Austin, TX

@shogunlab
Steven Patterson shogunlab
Shogun Lab conducts R&D to help organizations improve their security posture.

Shogun Lab

@hacksysteam
HackSys Team hacksysteam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

HackSys Inc

@patchpoint
PATCHPOINT patchpoint
We provide high-quality cyber intelligence services by analyzing patches for high-impact undisclosed vulnerabilities

PatchPoint. Inc.

@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@Nero22k
Nero22k
If your only tool is a debugger, then every problem begins to look like a bug

NSA Fort Meade, Maryland

@watchtowrlabs
watchTowr Labs watchtowrlabs
Labs division of watchTowr
@itaymigdal
Itay Migdal itaymigdal
Cyber Security geek
@connormcgarr
Connor McGarr connormcgarr

United States of America

@fkxdr
fkxdr fkxdr
not a threat actor
@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@Wh04m1001
Filip Dragović Wh04m1001
OSCP,OSEP,CRTO,CRTP,CRTE,PACES
@zimnyaa
zimnyaa
рабів до раю не пускають
@RussianPanda95
RussianPanda RussianPanda95
Senior Threat Intelligence Researcher | Malware Addict | Threat Hunter

TRAC Labs The United States

@KiFilterFiberContext
KiFilterFiberContext
Undergrad CS student at Arizona State

United States

@evilashz
evilash evilashz
Offensive Security Research
@S3N4T0R-0X0
S3N4T0R S3N4T0R-0X0
Offensive Security Engineer specializing in Adversary Simulation, Malware Dev, Defensive Evasion and developing custom tooling mimicking APTs

DREAMLAB TECHNOLOGY & INOVASYS

@JanielDary
Daniel Jary JanielDary
Security Researcher

UK

@waawaa
Alejandro Pinna waawaa
Offensive Security Researcher at SentinelOne

Madrid, Spain

@passthehashbrowns
passthehashbrowns
Red teamer/mediocre developer
@SafeBreach-Labs
SafeBreach Labs SafeBreach-Labs
SafeBreach Labs

Worldwide

@MarcOverIP
Marc Smeets MarcOverIP
Red teamer and horrible coder

@outflankbv Amsterdam

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@RistBS
RistBS
wannabe red teamer.

France

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia