Skip to content
View epi052's full-sized avatar
🍕
status updates are fleeting, but Wu-Tang is forever
🍕
status updates are fleeting, but Wu-Tang is forever

Sponsors

@mttaggart
@mzpqnxow

Block or report epi052

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@aixcc-public
AIxCC aixcc-public
AI Cyber Challenge
@hulto
Hulto hulto
Red Teamer | Developer | Infrastructure as Code enjoyer
@advanced-microcode-patching
ELF binary patching technology advanced-microcode-patching
Development of Shiva for DARPA's AMP (Assured Micropatching) program

United States of America

@oneNutW0nder
Simon B. oneNutW0nder
Interested in application security, red teaming, tool development, and binary exploitation.
@jonathanmetzman
jonathanmetzman
Security engineer working on open source and Chrome security

Google

@AFLplusplus
Advanced Fuzzing League ++ AFLplusplus
We want to make fuzzing better and better

Europe

@0xDeadcell
0xDeadcell
Lover of Berserk, and many cybersecurity related endeavors.
@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@tokatoka
Dongjia "toka" Zhang tokatoka
Maintainer for LibAFL. Ph.D candidate at @eurecom-s3
@lifting-bits
Lifting Bits lifting-bits
Binary Translation by @trailofbits

New York, NY

@bcoles
bcoles
` rm -rf /* `

` rm -rf /* ` ` rm -rf /* `

@SweetVishnya
Alexey Vishnyakov SweetVishnya
PhD in computer security

@yandex-cloud Moscow, Russia

@pventuzelo
Patrick Ventuzelo pventuzelo
CEO & Founder of @FuzzingLabs | Security Researcher. Focused on Fuzzing, Vulnerability Research, Reversing & Binary analysis

FuzzingLabs Paris, France

@andreafioraldi
Andrea Fioraldi andreafioraldi
Writing fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.

Antibes, France

@raefko
Nabih raefko
Security Researcher @FuzzingLabs

FuzzingLabs France

@borzacchiello
borzacchiello
PhD. Writing symbolic execution engines and program analysis related stuff
@wcampbell0x2a
wcampbell wcampbell0x2a
Rust Software Engineer / Reverse Engineer
@AndrewFasano
Andrew Fasano AndrewFasano
Researching the intersection of AI, dynamic program analysis, embedded systems, and vulnerability discovery. Work account: @andrew-aisi.

San Francisco, CA

@RickdeJager
Rick de Jager RickdeJager
InfoSec student at TU/e
@d0nutptr
d0nut d0nutptr
Security Engineer and Developer

San Francisco

@addisoncrump
Addison Crump addisoncrump
PhD at CISPA, member at secret.club, sleeping at home

@cispa Saarbrücken, Germany

@jrmo14
Jackson jrmo14
I dunno, I make stuff I guess...
@dtolnay
David Tolnay dtolnay

0xF9BA143B95FF6D82 Redwood City, California

@dalearbo
Dale dalearbo
Founder of AI This Job <-- RII <-- CTO of a commodity trading startup <-- Former Georgia Tech Research Institute . <-- Former SPAWAR

Research Innovations On a boat somewhere

@zardus
Yan Shoshitaishvili zardus
Former DEFCON CTF org. Captain Emeritus, @shellphish. Assoc Professor in Cybersecurity at @ASU. Director, American Cybersecurity Education Inst. @angr hacker.

Tempe, AZ, USA

@vanhauser-thc
van Hauser vanhauser-thc
Security researcher since 1994 https://www.mh-sec.de/ https://www.thc.org/

The Hacker's Choice | mh-sec | me | myself Berlin

@novafacing
Rowan Hart novafacing

@microsoft Portland, OR