8000 eversinc33 (eversinc33) / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View eversinc33's full-sized avatar
🔮
🔮

Block or report eversinc33

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@cnotin
Clément Notin cnotin
🔭 Security researcher @tenable 😈 Pentester 🌱 Developer

@Tenable France

@diversenok
diversenok diversenok
Aspiring Windows security researcher & system programmer; student.

@huntandhackett The Netherlands

@Ch40zz
Ch40zz Ch40zz
Interests: Reverse Engineering, Windows Internals, Exploiting, Gamehacking Programming Languages: C/C++, x86/x64 Assembly, C#, Python, JS, PHP

Germany

@Archie-osu
Archie_UwU Archie-osu
i dont know how computers work

Discord: archie_uwu Czech Republic

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@ZephrFish
Andy | ZephrFish ZephrFish
Hacker, Builder, Leader, Thinker, FAFO Engineer

Scotland

@VollRagm
VollRagm VollRagm
Discord: vollragm
@Cyber0P
Cyber Cyber0P
Interested in programming and Cyber security
@sevagas
Sio sevagas
I decided to create this Github along by blog to share my experimentations in the information security field.
@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@raax7
raax7 raax7
Interested in low-level programming, reverse engineering, obfuscation, code virtualization and Windows internals.
@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@HackingLZ
LZ HackingLZ
This is not the git account you're looking for...mainly backing up public repos.
@gabriellandau
Gabriel Landau gabriellandau
WinDbg’er at @elastic security

Elastic Maryland

@EgeBalci
Ege Balcı EgeBalci
Security Researcher

PRODAFT Den Haag, Netherlands

@zhuhuibeishadiao
猪会被杀掉 zhuhuibeishadiao
一入逆向深似海,从此孤单一个人。

WenZhou China

@connormcgarr
Connor McGarr connormcgarr
OSCP, OSCE, OSEE | Exploit Development, Vulnerability Research, and Red Teaming.

United States of America

@rogxo
Rog rogxo
C/C++, Reverse Engineering, Disassembly, Windows/Android Internals & Low-level stuff, Exploitations, Penetration Test and more...

Reverse Engineering Co. Ltd. Metaverse

@therealdreg
Dreg therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher

rootkit.es Spain

@0x44F
0x44F 0x44F
Contact me: jimothyroberts on Discord Please only serious enquiries, thanks.

China

@ekknod
ekknod ekknod
Anti-Cheat developer for ekknod.xyz

ekknod.xyz Finland

@donnaskiez
donnaskiez

Sydney, Australia

@0mWindyBug
Dor 0mWindyBug
Always on a learning curve
@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@Fyyre
Fyyre Fyyre
Old school, expert reverse code engineer.
@iPower
iPower iPower
Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @thesecretclub.

Mom's basement

@zer0condition
zer0condition
Kernel / Hypervisor / Security Researcher
@Zero-Tang
Zero Tang Zero-Tang
MS student graduated from Columbia University. Researcher of VM, OS and computer architecture. Founder of Project NoirVisor.

GrimoireTech Limited Shanghai, China

@daaximus
daax daaximus
technical research
@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@RiotVanguard

@bytecode77
Martin Fischer bytecode77
Software Developer & IT Security Expert

Germany

@zeze-zeze
Zeze zeze-zeze

TeamT5 Taiwan

@D4stiny
Bill Demirkapi D4stiny
Security @ Microsoft. Any work here is my own.

Microsoft

@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@stong
cts stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue. Previously @Vector35, @sslab-gatech.

@Zellic 0x4141414141414141

@MegaManSec
Joshua Rogers MegaManSec

5% in Australia, 95% somewhere in Eastern Europe

@ipSlav
ipSlav
Red team guy interested in researching, analyzing and detecting adversary tradecrafts and techniques.
@casterbyte
Caster casterbyte
Network Security Expert, Researcher
0