🐇
I'm following the white rabbit!
RedTeamer @picussecurity | wannabe Gopher | Father of the Luke
- Just for Cookie's...
- @come2darkside_
Arsenii es3n1n
es3n1n
my therapist told me that this is a great place to make new friends
not_es3n1n on discord
Shelldon
Sh3lldon
Windows Kernel/User Mode Exploit Developer & Red Teamer | OSED | OSEP | CRTO | CRTE | CRTM certified
Kazakhstan
Vixx
V-i-x-x
OSEE | OSCE3 | Senior Pentester | Expert Developer | Security Researcher
OffSec Lebanon
RussianPanda
RussianPanda95
Senior Threat Intelligence Researcher | Malware Addict | Threat Hunter
TRAC Labs The United States
pliny
elder-plinius
latent space liberator;
/n insert divider: •-•-•-•-<|L/O\V/E\/P\L/I\N/Y|>•-•-•-•
godmode:enabled
Pliny the Prompter
Opabinia
pentestfunctions
Just another github for crummy idea testing/prototyping.
COO @ Hacknexus Sydney, Australia
Sam Stepanyan
securestep9
OWASP Global Board Member /
OWASP London Chapter Leader (@owasplondon) with @kerberosmansour & @alezza
OWASP London Chapter London, UK
S3N4T0R
S3N4T0R-0X0
Offensive Security Engineer specializing in Adversary Simulation, Malware Dev, Defensive Evasion and developing custom tooling mimicking APTs
DREAMLAB TECHNOLOGY
Usman Sikander
Offensive-Panda
An infosec guy who's constantly seeking for knowledge.
Cytomate solutions and services Qatar
Ruben Groenewoud
Aegrah
Security research engineer at Elastic, focusing on Linux behavior-, signature- and ML-based detection engineering.
@elastic
Shashwat Shah
0xEr3bus
A young guy, highly interested in Offensive, Red teaming, and Windows Side. Visit my blog here blog.shashwatshah.me
PreviousNext