8000 notcpuid (William Long) / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View notcpuid's full-sized avatar
🐖
Working from home
🐖
Working from home
  • Abu Dhabi

Block or report notcpuid

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@MikeMirzayanov
Mike Mirzayanov MikeMirzayanov

Codeforces, ITMO Saint Petersburg

@es3n1n
Arsenii es3n1n es3n1n
my therapist told me that this is a great place to make new friends

not_es3n1n on discord

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@RiotVanguard

@torvalds
Linus Torvalds torvalds

Linux Foundation Portland, OR

@x64dbg
x64dbg x64dbg
An open-source x64/x32 debugger for windows.
@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@dmalan
David J. Malan dmalan
I teach @cs50.

@harvard Cambridge, MA, USA

@ZeroMemoryEx
Mairon ZeroMemoryEx
Cyber Security Consultant | Security Researcher
@senko37
senko senko37
RE, win internals, game hacking, low-level stuff

Samaraland

@vmcall 881D
vmcall

@thesecretclub

@herrcore
herrcore herrcore

OpenAnalysis Inc

@HoShiMin
Александр HoShiMin

OOO "SearchInform" Нижний Новгород, Россия

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@ayoubfaouzi
Ayoub Faouzi ayoubfaouzi
Reverse engineering, windows internals, and hypervisors.

Melbourne / Australia

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@NYAN-x-CAT
NYAN CAT NYAN-x-CAT
ᴄʏʙᴇʀsᴇᴄᴜʀɪᴛʏ ᴀɴᴅ ᴘᴇɴᴇᴛʀᴀᴛɪᴏɴ ᴛᴇsᴛɪɴɢ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇs ᴏɴʟʏ (I don't have YouTube channel)

Kuwait

0