Skip to content
View cyb3rjerry's full-sized avatar
:bowtie:
:bowtie:

Block or report cyb3rjerry

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@SecSamDev
Samuel Garcés Marín SecSamDev
Exploring new technologies, messing with the future.

Spain

@AptAmoeba
AptAmoeba AptAmoeba
Security Engineering | Pentesting | Malware Analysis
@psifertex
Jordan psifertex

@Vector35 Melbourne, FL

@lemonyte
Lemonyte lemonyte
Student by day, developer by night. Terminal enthusiast and creator of random websites.

@cloverdale-robotics-learning ~

@her0ness
Devid Lana her0ness
My name is Devid, My core skill set involves emulating real-world cyber attacks through Adversary Simulation and Red Team exercises.

Italy

@Lavender-exe
Lav Lavender-exe
Pentester & Cyber Nerd
@felixm-pw
Felix M felixm-pw
Sr Security Researcher

London

@radkawar
Rad Kawar radkawar
building the modern Deception Engineering platform @deceptiq

DeceptIQ

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@Cryakl
Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.
@salolivares
Sal Olivares salolivares
coding hard or hardly coding?

@semgrep cp_dustbowl

@loganleland
Logan Leland loganleland
signal: leland.01

Ohio

@Still34
Still / Azaka Still34
Threat intelligence researcher/analyst, PowerShell/.NET addict, etc.

Taiwan

@Gi7w0rm
Gi7w0rm
Computer Enthusiast | Interested in Malware and Reverse Engineering
@danielplohmann
Daniel Plohmann danielplohmann
Malware Researcher. Working for Fraunhofer @fkie.
@wazuh
Wazuh wazuh
The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

California

@cr-0w
crow cr-0w
🩸 CULT OF THE NECRO-COW; ALL HAIL THE 0xDEADBEEF.
@gracenolan
nolang gracenolan
Security Engineer, Google Sydney. she/her.

Google

@blacklanternsecurity
Black Lantern Security blacklanternsecurity
Security Organization

Charleston, SC

@Roni-Carta
Lupin Roni-Carta
Roni Carta alias Lupin. Red Teamer. Bug Hunter. Musician 🤘
@stong
cts stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue. Previously @Vector35, @sslab-gatech.

@Zellic 0x4141414141414141

@bplaxco
bplaxco
Sneaky Bit Flipper

@RedHatOfficial

@Gality369
Gality Gality369
Kernel Fuzz, Red team, AV

Beihang University

@S4ntiagoP
Santi S4ntiagoP
🇦🇷

MDSec Metaverse

@blackhatethicalhacking
Black Hat Ethical Hacking blackhatethicalhacking
Offensive Security: Information Security Solutions, Digital Forensics, Offensive Security Courses, Content Production, and Bug Bounty Hunting!

@blackhatethicalhacking Cyprus

@BishopFox
Bishop Fox BishopFox
The leader in offensive security, providing continuous pen testing, red teaming, attack surface management, and traditional security assessments.

United States of America

@tipsybacchus
TipsyBacchus tipsybacchus
Threat Intelligence Researcher
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@cisagov
Cybersecurity and Infrastructure Security Agency cisagov
Commit today, secure tomorrow.

United States of America