Skip to content
View koutto's full-sized avatar

Block or report koutto

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@Ab4y98
Daniel Abay Ab4y98
just another cyber security dude.
@kyleavery
Kyle Avery kyleavery
debugging with printf

@outflanknl Texas, USA

@swisskyrepo
Swissky swisskyrepo
Red Team Operator & Bug Hunter
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@Patrick-DE
Patrick Eisenschmidt Patrick-DE
Patrick E, Red Team Lead at @NVISOsecurity

@NVISOsecurity

@Cerbersec
Cerbersec Cerbersec

NVISO Underworld

@Euzebius
Euz Euzebius
Gamer, hacker. Purple teamer at 💜. Infosec swiss army knife. Love pentest, threat hunting, IR. HTB player : euz. I didn't choose InfoSec, it chose me.

127.0.0.42

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@0xTriboulet
Steve S. 0xTriboulet
Allegedly some kind of researcher
@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@laluka
Laluka laluka
Black Hat ? Hello no ! Black Cat.

ThinkLoveShare FRANCE

@yusufqk
yusufqk
Malware Researcher
@S4ntiagoP
Santi S4ntiagoP
🇦🇷

MDSec Metaverse

@Hackndo
Pixis Hackndo
Security blog author https://hackndo.com

Login Sécurité Paris

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@RiotVanguard

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | Seeking Knowledge | co-founder of maldevacademy.com
@jhaddix
Jason Haddix jhaddix
Father, hacker, blogger, gamer, & nerd. Bounty Hunter.

United States

@wbenny
Petr Beneš wbenny

Brno, Czech Republic

@guidedhacking
GuidedHacking guidedhacking
Reverse Engineering & Game Hacking Tutorials

United States of America

@FortyNorthSecurity
FortyNorth Security FortyNorthSecurity
FortyNorth Security is a computer security consultancy specializing in offensive security work. We regularly perform red team assessments, pen tests, and more.

Colorado, USA

@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP

Specter Ops France

@frkngksl
Furkan Göksel frkngksl
Security Enthusiast and Developer

Picus Security R'lyeh

@Coldzer0
Coldzer0 Coldzer0
Malware 🕶 Offensive Tools Developer 😎 Reverse Engineer 🐉
@phith0n
Owen Gong phith0n
Creator of @vulhub

Singapore

@therealdreg
Dreg therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher

rootkit.es Spain

@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@honoki
honoki

Brussels