8000 chocl01 (David) / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View chocl01's full-sized avatar
  • New York, New York

Block or report chocl01

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@Stuub
Stuart Beck Stuub
breaks things | makes things that breaks things
@ProDefense
ProDefense ProDefense

United States of America

@simplerhacking
simplerhacking
Security Architect. Ex-Big Tech. @hackerone @simplerhacking @NVIDIA Learn more: www.simplerhacking.com

Simpler Hacking

@hetznercloud
Hetzner Cloud hetznercloud
Tools and libraries for Hetzner Cloud

Germany

@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
@Rhynorater
Justin Gardner Rhynorater
Full-time Bug Bounty Hunter && Host of CTBB Podcast

Advisor @caido | Hacker @critsoftware Richmond, VA

@sfewer-r7
Stephen Fewer sfewer-r7
Principal Security Researcher at Rapid7

@rapid7 Ireland

@hajimehoshi
Hajime Hoshi hajimehoshi
CTO at Odencat. Author of Ebitengine.

Odencat Tokyo, Japan

@facebookincubator
Meta Incubator facebookincubator
We work hard to contribute our work back to the web, mobile, big data, & infrastructure communities. NB: members must have two-factor auth.

Menlo Park, California

@AlexAltea
Alexandro Sanchez AlexAltea
Security, reversing, mathematics. Writing emulators and hypervisors.

Astral Technologies Les Escaldes, Andorra

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@capstone-engine
Capstone Engine capstone-engine
Capstone disassembly/disassembler framework
@fkasler
fkasler

SpecterOps Raleigh NC

@apple
Apple apple

Cupertino, CA

@breadchris
Chris breadchris
Tell me, have you seen the marvelous breadfish?

LunaSec United States

@pry0cc
pry0cc pry0cc
Inventor of Axiom

Austin, TX

@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.
@SpecterOps
SpecterOps SpecterOps

United States of America

@dreadnode
dreadnode dreadnode
AI Red Teaming | Research. Tooling. Evals. Cyber range.
@jackson5sec
jackson5 jackson5sec
Y2hhb3MgY29udHJvbGxlZAo=
@HackingDave
David Kennedy HackingDave
Husband, Father, Hacker, Coder, CEO, CISO, Speaker, USMC. CEO of TrustedSec and Founder, CTO of Binary Defense.

TrustedSec and Binary Defense Cleveland Ohio

@RedSiege
Red Siege RedSiege
Offensive Services from Offensive Minds
@NetsecExplained
NetsecExplained
Netsec Explained is a passion project where I explain intermediate and advanced computer network security topics
@Azure
Microsoft Azure Azure
APIs, SDKs and open source projects from Microsoft Azure

United States of America

@optiv
Optiv Source Zero optiv
Optiv Source Zero provides research, tools and resources for the innovative cybersecurity community. Part of Optiv.

Global

@PaloAltoNetworks
Palo Alto Networks PaloAltoNetworks
We ensure each day is safer and more secure than the one before.

United States of America

@Coalfire-Research
Coalfire Labs R&D Coalfire-Research
Advancing the state of the Infosec industry by providing cutting-edge research, open-source tools and tradecraft
@NetSPI
NetSPI NetSPI

Minneapolis, MN

@RhinoSecurityLabs
Rhino Security Labs RhinoSecurityLabs
A boutique penetration testing and security assessment firm in Seattle, WA.

Seattle, WA

@nccgroup
NCC Group Plc nccgroup
Please report all security issues to security at nccgroup dot com

Global

@BishopFox
Bishop Fox BishopFox
The leader in offensive security, providing continuous pen testing, red teaming, attack surface management, and traditional security assessments.
@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@doyensec
Doyensec doyensec
Doyensec works at the intersection of software development and offensive engineering. We discover vulnerabilities others cannot, and help mitigate the risk.

San Francisco / Warsaw

@Snowflake-Labs
Snowflake Labs Snowflake-Labs
Snowflake ❤️ Open Source

data ☁️

@Netflix
Netflix, Inc. Netflix
Netflix Open Source Platform

Los Gatos, California

@jhaddix
Jason Haddix jhaddix
Father, hacker, blogger, gamer, & nerd. Bounty Hunter.

United States

0