Skip to content
View v-p-b's full-sized avatar

Block or report v-p-b

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@pwnfuzz
PwnFuzz pwnfuzz
Offensive R&D lab focused on exploit engineering, kernel exploits, and fuzzing.
@KpwnZ
xia0o0o0o KpwnZ
CTF with @r3kapig. Interested in JIT security & verification, XNU kernel. Currently at University of California, San Diego

Exception level 3

@richinseattle
richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ http://fuzzing.io; hacking the planet since 1995; Undercurrents BOFH
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@addisoncrump
Addison Crump addisoncrump
PhD at CISPA, member at secret.club, sleeping at home

@cispa Saarbrücken, Germany

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@r0keb
Ö r0keb
Low level enthusiast
@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@es3n1n
Arsenii es3n1n es3n1n
extremely bad at everything i do

not_es3n1n on discord

@TheN00bBuilder
TheN00bBuilder
i may not be slick, but i get it done
@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex
@lowleveldesign
Sebastian Solnica lowleveldesign
Writing unsafe garbage-collected code.

Poland

@Binary-Offensive
mgeeky | Binary-Offensive.com Binary-Offensive
My private Offensive Security Tooling (OST) shared with InfoSec Professionals & sponsors with aim to improve cyber-resilience against real-world APTs

Poland

@secretsquirrel-sponsors
SecretSquirrel Sponsors secretsquirrel-sponsors
The location for code, research, and ideas for SecretSquirrel Sponsors
@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@antoniovazquezblanco
Antonio Vazquez antoniovazquezblanco
I enjoy electronics, reverse engineering, programming, infosec, low level and bare metal stuff. Currently in the discovery of radio and signal processing!

Tarlogic Spain

@klezVirus
klezVirus
Lucky husband, proud father, and security researcher

SpecterOps

@safedv
safe safedv
Red Team Operator

0.0.0.0

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@fmagin
Florian Magin fmagin
Security Researcher @Fraunhofer-SIT CTF @WizardsOfDos

Darmstadt, Germany

@PoC-dev
Patrik Schindler (PoC is for Patrik ohne C) PoC-dev
Homebase: Germany. Linux-Server Sysadmin since ca. 1995, general Retrocomputing fan, not interested in Windows. Lately very interested in AS/400 and (less) MVS.

Mathias Peter IT-Systemhaus e. K. Offenburg, Germany

@hackerschoice
The Hacker's Choice hackerschoice
IT Security Research Group (Non-profit)

Everywhere

@0xeb
Elias Bachaalany 0xeb
** YouTuber ** Author: Batchography ** Co-author: Practical Reverse Engineering & Antivirus Hacker's Handbook.
@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@disconnect3d
Disconnect3d disconnect3d
Security Engineer, Pwndbg project maintainer, CTF player

@trailofbits world / krk.

@wchen-r7
sinn3r wchen-r7
Former Lead Security Researcher / Exploit Developer for the Metasploit Project at Rapid7 (Mar 2011 - Nov 2019) Other github accounts: @sinn3r, @atxsinn3r

Rapid7 ATX