😴
Playing with memory regions...
part time stack frame counterfeiter
- 0x41414141
- https://layle.me
- @layle_ctf
- @layle.bsky.social
LDT9510
Mechatronics Engineer, working as a software developer. Interested in game development and graphics programming.
@solinftec São Paulo
K3rn3l Panic
AnkurYogi
Security Engineer & a novice researcher :)
Focused on Advanced DNS evasion, malware reversing, and detection techniques.
Mumbai
ApkUnpacker
apkunpacker
Android ɹǝǝuıƃuǝ ǝsɹǝʌǝᴚ, Android/iOS Dynamic and static analysis, Radare2, Frida, Vulnerability Research, RASP Bypass.
127.0.0.1
Zsolt Zitting
yellowberryHN
I exist. That's pretty much it. Founder and lead developer at @HarpNetStudios.
@HarpNetStudios 127.0.0.1
danill123
excited to learn something new & like solving problems with technology.
Depok, Jawa Barat, Indonesia
Asuna
SpriteOvO
C++, C, Rust / Cross-platform desktop & former Windows kernel driver developer, reverse engineer / Owning a HomeLab / Working at late night / BTW, I use Arch.
PLCT Lab Wuhan <- Chengdu, China
Mahmoud Rusty Abdelkader
mahmoudimus
Cryptography, Reverse Engineering, Fintech and Privacy
United States
Halim
hxlxmj
I specialize in offensive security, identifying critical vulnerabilities to secure systems. Recognized in global bug bounty programs, I stay ahead of threats.
wezoomagency Montréal
dword64
dword64
Security Researcher & Reverse Engineer | Windows kernel, low-level dev, static analysis, obfuscation/deobfuscation, virtualization.
xor eax,eax ret
PreviousNext