Skip to content
View szymex73's full-sized avatar
🙁
why
🙁
why

Organizations

@justcatthefish

Block or report szymex73

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@ghostty-org
Ghostty ghostty-org
A new terminal, started by @mitchellh 👻

United States of America

@ZetaTwo
Calle Svensson ZetaTwo

XTX Markets London, United Kingdom

@jktrn
enscribe jktrn
Design engineering & security research | @project-sekai-ctf @ctf-mt

Los Angeles, CA

@crazymanarmy
crazyman crazymanarmy
a noob member in @r3kapig the leader of @ShadowChasing1

r3kapig

@bookkity
Bookkity bookkity
Community organization

Poland

@ANDnXOR
AND!XOR ANDnXOR
Official Github account for AND!XOR. Check us out on Twitter @ANDnXOR

@andnxor

@TheOfficialFloW
Andy Nguyen TheOfficialFloW
Information Security Engineer

Zurich

@kimasendorf
Kim Asendorf kimasendorf
Art [n'Code]

テkim Bremen

@Geoxor
George Tsotsos Geoxor
Hello I am Geoxor, I make music on the internet and code stuff on my free time!

Geoxor Florina, Greece

@Mardcelo
Mard Mardcelo
That Half-Drunk Security Researcher 🍺

MardLab South Korea

@0mWindyBug
Windy Bug 0mWindyBug
Always on a learning curve
@unrooted
unrooted
half criminal, half maverick, all mercenary threat hunter at work, threat maker after hours

@redcode-labs

@GlasgowEmbedded
Glasgow Embedded GlasgowEmbedded
Home of the Glasgow Interface Explorer
@nop-tech
nop nop-tech
IT-Security Student | OSCP & OSED certified
@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | Seeking Knowledge | co-founder of maldevacademy.com
@rad9800
rad9800

DeceptIQ UK

@xRET2pwn
RET2pwn xRET2pwn
#24 y/o | Binary Exploitation Player | Wannabe Red Team Operator

Kernel

@sliverarmory
Sliver Armory sliverarmory
The finest collection of open-source armaments, curated for the aspiring cyberwar profiteer.
@Wh04m1001
Filip Dragović Wh04m1001
OSCP,OSEP,CRTO,CRTP,CRTE,PACES
@moloch--
Joe moloch--
I like computers.

Hacker / Programmer Earth

@klezVirus
klezVirus
Lucky husband, proud father, and security researcher

SpecterOps

@S1ckB0y1337
Nikos Katsiopis S1ckB0y1337
Im nobody....

@NVISOsecurity Greece

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@AzAgarampur
Arush Agarampur AzAgarampur
I enjoy Windows internals, low-level development, reverse engineering, and offensive security

California

@dirkjanm
Dirk-jan dirkjanm

Outsider Security The Netherlands

@osresearch
Trammell Hudson osresearch
I like to take things apart.

Lower Layer Labs AMS

@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
@smokeme
Fawaz Adi smokeme
Cyber security researcher & developer

Kuwait

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@passthehashbrowns
passthehashbrowns
Red teamer/mediocre developer
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy