Ibrahim Ghonem
Ramyromel
Redefining science and technology through an unconventional approach that combines artificial intelligence, cybersecurity, physics, medicine, military technolog
Sky limit Egypt
killvxk
在你面前的是:大宗师,大德鲁伊,屠魔者,死亡领主,大领主,大法师,先知,大祭司,战争领主,虚空领主,狩猎大师,暗影之刃,奈非天,白狼,昆特牌的大师,猎魔人,守望先锋成员,单排吃鸡者。
USSR
Zichuan Li
river-li
Ph.D. student at UIUC, focused on computer system security.
University of Illinois Urbana-Champaign Champaign, IL
agnosticlines
reverse engineering, program analysis and exploit dev |
i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects
[object Object] /dev/kmem
winterknife
winterknife
low-level developer with a focus on 𝙸𝚗𝚝𝚎𝚕 𝚡𝟾𝟼 ISA devices running 𝚆𝚒𝚗𝚍𝚘𝚠𝚜
Coruscant
Samy Lahfa
AkechiShiro
Computer are full of assumption, acquiring knowledge of those is hard but necessary in security @NixOS @winapps-org @Athena-OS
France
astro
vxcute
a college student trying to be a good programmer no matter what mother flippers.
Alexandria, Egypt
Jevin Sweval
jevinskie
Senior Security Researcher, compilers/optimizations/[de]obfuscation, SCA, program analysis, NFC ninja, HW hacker w/ FPGA hammer
Previously Apple Pay Security
Lafayette, Indiana
Minh-Triet Pham Tran
trietptm
APT Hunter, Threat Hunter, Incident Responder, Forensics Analyst, Information Security Consultant, Red Teamer (Network+System views)
TRIETPTM INFOSEC Vietnam
PreviousNext