Skip to content
View tekwizz123's full-sized avatar

Organizations

@pwnwiki

Block or report tekwizz123

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@jcran
Jonathan Cran jcran
cybersecurity stuff, mostly

Austin, TX

@afang5472
afang5472 afang5472
pwner@Never Stop Exploiting

DOD85.pdf RealFan of Faker

@ayoubfaouzi
Ayoub Faouzi ayoubfaouzi
Reverse engineering, windows internals, and hypervisors.
@alisaesage
Alisa alisaesage
Excellence is what mediocrity fears most

independent hyperspace

@ionescu007
Alex Ionescu ionescu007
CTIO at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.windows-internals.com

Winsider Seminars & Solutions Inc.

@0xcpu
panda bear 0xcpu
nothing interesting
@abatchy17
Mohamed Shahat abatchy17
Security researcher

Vancouver, BC

@repnz
Ori Damari repnz
windows kernel research & development

0x7c00

@wbaby
GOPA wbaby
GAME OVER PLAY AGAIN? YES or NO
@tinysec
TinySec tinysec
Security Researcher

you can guess moon

@L4ys
Lays L4ys
Lazy Security Researcher

@TrapaSecurity Taiwan

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@mubix
Rob Fuller mubix
Certified Checkbox Unchecker

@NoVAHackers Internets