Skip to content
View 0xsyr0's full-sized avatar
😈
Spirit Animal: Trojan Horse
😈
Spirit Animal: Trojan Horse

Block or report 0xsyr0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@iamavu
Avantika iamavu
wanderer of rabbit holes
@praetorian-inc
Praetorian praetorian-inc
Praetorian provides a suite of security solutions that enable clients to solve cybersecurity problems across their enterprise and product portfolios.

US (Austin, TX)

@UberGuidoZ
UberGuidoZ UberGuidoZ
From security to obscurity...

Everywhere and nowhere

@rizinorg
Rizin Organization rizinorg
Rizin is a free and open-source Reverse Engineering framework
@dfir-iris
DFIR-IRIS dfir-iris
Collaborative Incident Response Platform - Initiated by Airbus Cybersecurity

France

@MatheuZSecurity
matheuz MatheuZSecurity
Red Team Operator | Cyber Threat Intelligence | Security Researcher

Brazil

@JoshuaMart
Joshua MARTINELLE JoshuaMart

Senior Research Engineer - Tenable France

@Leo4j
Rob Leo4j
Active Directory, Red Teaming, and Network Security
@elder-plinius
pliny elder-plinius
latent space liberator; steward of BASI !insert_divider: •-•-•-•-<|L/O\V/E\/P\L/I\N/Y|>-•-•-•-• {GODMODE:ENABLED}

Pliny the Prompter

@fin3ss3g0d
Dylan Evans fin3ss3g0d
🔓 Master of the virtual heist. Unlocks cyber doors while wearing a white hat. OSEP-certified ethical hacker, converting caffeine ☕ and curiosity 🤔 into code.

United States

@CyberSecurityUP
Joas A Santos CyberSecurityUP
Academic and Professional experience in Cyber Security / Red Team Lead / Information Security Researcher.

Brasil

@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@CX330Blake
CX330 CX330Blake
Undergraduate | Hacker | Developer | CTF | Python | JavaScript | C | Java | React | - Build the universe with me

nullptr

@logangoins
Logan Goins logangoins
Adversary Simulation @SpecterOps

@Specterops Texas

@BloodHoundAD
BloodHound Legacy Account (Deprecated) BloodHoundAD
Deprecated GitHub account for BloodHound Legacy (v4 - outdated) and other older repositories. Please use SpecterOps GitHub account and its repos going forward.

United States of America

@trickest
Trickest | Offensive Security Automation trickest
Visualize, operate & scale everything offensive security in one-platform.
@TheManticoreProject
The Manticore Project TheManticoreProject
Crowdsourced open source offensive and defensive security tools, to heighten the security posture of the community as a whole

France

@CVEProject
CVE Program CVEProject
The mission of the CVE™ Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
@alleleintel
Allele Security Intelligence alleleintel
Allele Security Intelligence is an independent company specializing in Information Security research.

Allele Security Intelligence Everywhere

@EvilBytecode
EvilBytecode
For educational purposes only. Explicit authorization required. No warranties. Author disclaims all responsibility for unauthorized use.

TM. Codepulze Mem

@Sh3lldon
Shelldon Sh3lldon
Adversary Simulation & Malware Development | OSED | OSEP | CRTO | CRTE | CRTM certified

Gotei 13

@3lp4tr0n
elp4tr0n 3lp4tr0n
Offensive Security
@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@tijme
Tijme Gommers tijme
Adversary Simulation - TIBER - ART - Red Teaming

@ABNAMRO The Netherlands

@Cryakl
Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.
@affix
Keiran Smith affix
Penetration Tester and Developer from Scotland

@nable-org Scotland

@XaFF-XaFF
XaFF XaFF-XaFF
Expert @ Googling stuff

Poland

@repnz
Ori Damari repnz
windows kernel research & development

0x7c00

@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex
@screetsec
Edo Maland screetsec
ꜱᴇɴɪᴏʀ ꜱᴇᴄᴜʀɪᴛʏ ᴄᴏɴꜱᴜʟᴛᴀɴᴛ/ ᴘᴇɴᴇᴛʀᴀᴛɪᴏɴ ᴛᴇꜱᴛᴇʀ | ᴏꜱᴇᴘ | ᴏꜱᴄᴘ | ᴏꜱwᴘ | ᴏꜱwᴇ | ᴄʀᴛᴘ | ᴄʀᴛᴇ | ᴄʀᴛᴏ | ᴇᴡᴘᴛxᴠ2 | ᴇᴄᴛᴘxᴠ2 - ᴡᴀɴɴᴀʙᴇ ʀᴇᴅ ᴛᴇᴀᴍᴇʀ
@gsmith257-cyber
S1n1st3r gsmith257-cyber
Red Team Lead

@PhantomSecurityGroup

@cure53
Cure53 cure53
And there is fire where we walk.

Fine penetration tests for fine websites Berlin

@jenaye
H Mike jenaye
Red team operator for @Orange-Cyberdefense Creator of @matro7sh & michmich.eu

@Orange-Cyberdefense @Inshallhack @matro7sh Marseille

@BishopFox
Bishop Fox BishopFox
The leader in offensive security, providing continuous pen testing, red teaming, attack surface management, and traditional security assessments.

United States of America

@moloch--
Joe moloch--
I like computers.

Hacker / Programmer Earth

@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@susMdT
Dylan Tran susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman Ex-CPTC & Ex-CCDC @cpp-cyber

IBM X-Force Red Adversary Simulation Building 98C, 4-23: Telco Lab @ CPP

@redr0nin
redr0nin
Principal Red Team Operator & Technical Exploitation Officer