Skip to content
View nodauf's full-sized avatar

Block or report nodauf

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@zigtur
Zigtur zigtur
Zigtur = (Blockchain lover)³ * (Cybersec professional + ReverseEngineeringLearner)² + 3 * (Cryptography(ZK,ECC)) 🤖 🏆
@rtecCyberSec
r-tec Cyber Security rtecCyberSec
reframe your readiness

Germany

@TheManticoreProject
The Manticore Project TheManticoreProject
Crowdsourced open source offensive and defensive security tools, to heighten the security posture of the community as a whole

France

@SpecterOps
SpecterOps SpecterOps

United States of America

@tailscale
Tailscale tailscale
Tailscale is a WireGuard-based app that makes secure, private networks easy for teams of any scale.

Canada

@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP

Specter Ops France

@D4stiny
Bill Demirkapi D4stiny
Security Researcher. Any work here is my own.
@felmoltor
Felipe Molina felmoltor

Orange Cyberdefense Madrid / Jaén / London

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@ayoubfaouzi
Ayoub Faouzi ayoubfaouzi
Reverse engineering, windows internals, and hypervisors.
@zyn3rgy
Nick Powers zyn3rgy
Adversary Simulation @ SpecterOps

SpecterOps

@cedowens
Cedric Owens cedowens
offensive security engineer
@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@Dfte
Deft_ Dfte
I hate not understanding precisely how things work.
@AzAgarampur
Arush Agarampur AzAgarampur
I enjoy Windows internals, low-level development, reverse engineering, and offensive security

California

@anacrolix
Matt Joiner anacrolix
Functional programming, concurrency and decentralized systems.

'Strayan Alps

@d4rkiZ
Yoni Haziza d4rkiZ
Penetration Tester

israel

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@charmbracelet
Charm charmbracelet
We make the command line glamorous.

/dev/tty

@Ethnical
Ethnical
Security Engineer @ethereum-optimism 🔴✨

@ethereum-optimism Malta

@repnz
Ori Damari repnz
windows kernel research & development

0x7c00

@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@Sh3lldon
Shelldon Sh3lldon
Adversary Simulation & Malware Development | OSED | OSEP | CRTO | CRTE | CRTM certified

Gotei 13

@bad-sector-labs
Bad Sector Labs (Inactive) bad-sector-labs
Actual github org at github.com/badsectorlabs
@1mm0rt41PC
1mm0rt41PC 1mm0rt41PC
Ethical hacker / Pentester / Malware hunter

Switzerland, Lausanne

@AsahiLinux
Asahi Linux AsahiLinux
Porting Linux to Apple Silicon Macs
@Wh04m1001
Filip Dragović Wh04m1001
OSCP,OSEP,CRTO,CRTP,CRTE,PACES
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@k4nfr3
k4nfr3

blue planet

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@gabriellandau
Gabriel Landau gabriellandau
WinDbg’er at @elastic security

Elastic Maryland

@x1tan
xitan x1tan
hypervisors, windows internals, reverse engineering
@emilk
Emil Ernerfeldt emilk
Rust coder, creator of egui, CTO of rerun.io

Rerun.io, egui Stockholm, Sweden

@caido
Caido caido

Montreal, Canada

@trickster0
trickster0 trickster0
Lead Red Teamer & Malware Dev, Reverse engineering for fun and analyzing Winternals

Greece

@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@0xor0ne
0xor0ne 0xor0ne
Cyber Security - Malware - Exploits - Embedded/IoT - C and Rust - Linux (kernel)

Europe