Skip to content
View sbousseaden's full-sized avatar

Block or report sbousseaden

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@vvalien
Chris vvalien
Busy hacking all the things.
@itm4n
Clément Labro itm4n
Pentest & Windows security research
@marpie
Markus Piéton marpie

Code White GmbH (@codewhitesec)

@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@kost
kost kost
Free software/Security contributor

Diverto Zagreb, Croatia

@daanraman
Daan Raman daanraman

@NVISOsecurity Belgium

@med0x2e
Mohamed El Azaar med0x2e
RedTeamer & Security Researcher, used to be a Software Engineer/Developer, Manga/Anime Otaku

Yo. 127.0.0.1

@lnxg33k
Ahmed Shawky lnxg33k

@cyberdefenders Dubai, UAE

@AxtMueller
Axt Müller AxtMueller
I am a courier driver who is good at making Windows Drivers.

Deutsche Post DHL Group Germany

@JohnLaTwC
John Lambert JohnLaTwC
@JohnLaTwC Security Fellow and Corporate Vice President, Microsoft Security

Microsoft Corporation

@WilliamLeara
William Leara WilliamLeara
BIOS/FW Architect, Dell Technologies Inc.

Dell Technologies Inc. Texas

@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@leechristensen
Lee Chagolla-Christensen leechristensen
I like to make computers misbehave

SpecterOps Seattle

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@matterpreter
Matt Hand matterpreter
Aut viam inveniam aut faciam

@preludeorg USA

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@rvrsh3ll
Steve Borosh rvrsh3ll
I hack code together and hope it works.

https://futuresec.io Gamma Quadrant 4

@padovah4ck
chris padovah4ck
AppSec / Programming / SANS [GIAC GSSP-.NET]

Padua - Italy || c:\users\chris

@ryhanson
Ryan Hanson ryhanson
Security Researcher and Red Teamer
@infosecn1nja
Rahmat Nurfauzi infosecn1nja
Security Researcher/Red/Purple Teaming/Adversary Simulation/Threat Hunter. Contributors of Atomic Red Team, PS Empire, MITRE ATT&CK Framework, LOLBas, and more.

Jakarta, Indonesia

@zprogram
zzzhhh zprogram
vulnerability detection;Incident response;
@pedramamini
Pedram Amini pedramamini
Chief Scientist at @OPSWAT. Formerly CTO at @InQuest. Previously founded the ZeroDayInitiative.com and OpenRCE.org. @pedramamini.com on BlueSky.

@InQuest Austin, TX

@Cyb0r9
Cyborg Cyb0r9
Im doin this for fun..

@Cyb0r9 Tunisia

@JR0driguezB
JR0driguezB JR0driguezB
Malware analyst and researcher. Threat Intelligence.
@op7ic
Jerzy 'Yuri' Kramarz op7ic
Thinker, Red and Blue operator
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@blackorbird
blackorbird blackorbird
APT hunter threat analyst

https://twitter.com/blackorbird https://twitter.com/blackorbird