Skip to content
View sh4m2hwz's full-sized avatar
👾
low level devs,reverse engineer,pwner,researcher,web3 hacker -)
👾
low level devs,reverse engineer,pwner,researcher,web3 hacker -)

Block or report sh4m2hwz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@itm4n
Clément Labro itm4n
Pentest & Windows security research
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@fluentlabs-xyz
fluentlabs-xyz
The first blended execution network. Fluent blends Wasm, EVM and SVM apps into a unified execution environment.

United States of America

@SaadAhla
d1rk SaadAhla
Security researcher, malware dev

Morocco

@vtil-project
VTIL Project vtil-project
VTIL (Virtual-machine Translation Intermediate Language) Project is a set of tools that can be used for binary deobfuscation and devirtualization.
@PacSec
PACMAN PacSec
Sec and R&D shit
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@tomnomnom
TomNomNom tomnomnom
Open-source tool maker, trainer, talker, fixer, eater, not really a sheep. He/him.

Yorkshire, UK

@0xKira
Kira233 0xKira
Security researcher
@0x90
0x90 0x90
802.11 pwner, embedded devices hacker and just another security guy