Skip to content
View Rvn0xsy's full-sized avatar
👋
Hi
👋
Hi

Block or report Rvn0xsy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@modelcontextprotocol
Model Context Protocol modelcontextprotocol
An open protocol that enables seamless integration between LLM applications and external data sources and tools.
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@OpenBAS-Platform
OpenBAS Platform OpenBAS-Platform
Open Adversary Exposure Validation Platform

United States of America

@MythicMeta
Mythic Meta Configuration Information MythicMeta
Docker Templates and PyPi Package Source Code used in Mythic
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@theniceboy
David Chen theniceboy
Starcraft II Player
@wietze
Wietze wietze

London, United Kingdom

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@FoxIO-LLC
FoxIO FoxIO-LLC
FoxIO is a technology innovations company focused on creating simple, highly-effective solutions to major industry problems.

United States of America

@hackerschoice
The Hacker's Choice hackerschoice
IT Security Research Group (Non-profit)

Everywhere

@BC-SECURITY
BC Security BC-SECURITY
Cybersecurity Engineers and Offensive Security enthusiasts actively maintaining/updating Powershell Empire in our spare time.
@center-for-threat-informed-defense
The Center for Threat-Informed Defense center-for-threat-informed-defense
An R&D organization focused on advancing the state of the art and the state of the practice in threat-informed defense.

United States of America

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@nsacyber
NSA Cybersecurity Directorate nsacyber
Official GitHub account for NSA Cybersecurity Directorate. Formerly branded as NSA Cybersecurity, NSA Information Assurance, & Information Assurance Directorate

Fort Meade, MD

@TarlogicSecurity
TarlogicSecurity
Cyber security, cyber intelligence, Red Team

Tarlogic

@AlkenePan
Gaba AlkenePan
infosec R&D

@bytedance

@wecooperate
wecooperate
拒绝内卷、合作共赢 | wecooperate、wewin
@cn-kali-team
三米前有蕉皮 cn-kali-team
Information Security Research & Development

@emo-crab @0x727 China

@gh0stkey
EvilChen gh0stkey
(ATT&DEF)er

OverSpace & HACK THE WORLD China

@EncodeGroup
Encode EncodeGroup
Cyber Threat Management and Security Analytics
@jackullrich
jackullrich
winternl.com
@bxcodec
Iman Tumorang bxcodec
Software Engineer | Blogger | Open Source Enthusiast | Startup Enthusiast

@softwarearchitectid Tallinn, Estonia

@swisskyrepo
Swissky swisskyrepo
Red Team Operator & Bug Hunter
@0verSp4ce
OverSpace 0verSp4ce
凌驭空间安全团队,我们希望拥有驾驭网络空间的安全能力,并以此能力回馈网络空间,贡献自己的力量。
@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@0x727
0x727 0x727
learn more, share more
@klezVirus
klezVirus
Lucky husband, proud father, and security researcher

SpecterOps

@sailay1996
valen sailay1996
Just an idiot, a tiny presence in an infinite universe. S-1-5-7

Myanmar

@netbiosX
netbiosX netbiosX
Director of Pentest Laboratories

PentestLab London

@skywind3000
Linwei skywind3000
Coding since 1991

PRC

@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP

Specter Ops France

@EtherDream
EtherDream EtherDream
A Web Hacker & Geeker

[object Location]

@CanIPhish
CanIPhish CanIPhish
Striving to shine a light on the internet of phish.

CanIPhish New South Wales, Australia

@phra
Francesco Soncina phra
OSCE // OSCP // Ethical Hacker & Red Teamer // Full Stack Developer // JavaScript Enthusiast // Staff Member of @BolognaJS // CTF player at @d0nkeys

@d0nkeys @BolognaJS Amsterdam, NL

@tomcarver16
Tom Carver tomcarver16

Manchester, United Kingdom

@d35ha
Mustafa Mahmoud d35ha
Malware Researcher (this is a personal account and doesn't represent my boss or my company).

Google UAE

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@zcgonvh
zcgonvh zcgonvh
Window and .net
@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA