Skip to content
View thecatontheceiling's full-sized avatar
💥
103 stalkers
💥
103 stalkers

Organizations

@massgravel @team-mushroom @gravesoft

Block or report thecatontheceiling

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@HyperSine
HyperSine
I seek truth.
@lhecker
Leonard Hecker lhecker

@microsoft Germany

@revoltchat
Revolt revoltchat
Open source user-first chat platform.

Europe

@es3n1n
Arsenii es3n1n es3n1n
my therapist told me that this is a great place to make new friends

not_es3n1n on discord

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@cdong1012
Chuong Dong cdong1012
MSTIC Senior RE @ Microsoft. Former FLARE RE @ Mandiant. I do malware stuff.

Microsoft Atlanta, GA

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@InvoxiPlayGames
Emma InvoxiPlayGames
self-proclaimed "security researcher" and "reverse engineer", huge fan of PowerPC-based platforms - 21 - she/it

England, UK

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@daaximus
daax daaximus
technical research
@KiFilterFiberContext
KiFilterFiberContext
Undergrad CS student at Arizona State

United States

@zer0condition
zer0condition
Kernel / Hypervisor / Security Researcher
@GrapheneOS
GrapheneOS GrapheneOS
Security and privacy focused mobile OS with Android app compatibility. We focus on developing substantial privacy and security improvements.

Toronto, Ontario, Canada

@thepeacockproject
The Peacock Project thepeacockproject
The Peacock Project is a HITMAN™ World of Assassination trilogy server replacement.
@two-twelve
TwoTwelve two-twelve
We like to build cool things on the web.

United Kingdom

@gravesoft
Gravesoft gravesoft
People making open-source and free software.
@glacier-modding
Glacier 2 Modding glacier-modding
Tools and research for IO Interactive's Glacier 2 engine
@WitherOrNot
WitherOrNot
i fight computers with my bare hands

@massgravel the sunken place

@pbatard
Pete Batard pbatard
A Free Software Developer, with more decades of experience than we care to admit — It is through this lens that we see the FSF's foresight being vindicated...

akeo.ie Ireland

@Wack0
Rairii Wack0
Some people port Doom to things, I port NT to things.
@massgravel
MASSGRAVE massgravel
People researching Microsoft Windows activation services.