8000 zcrosman (Zach Crosman) / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View zcrosman's full-sized avatar

Block or report zcrosman

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@xssdoctor
xssdoctor xssdoctor
Hacker and cardiologist. Not necessarily in that order
@siyuan-note
SiYuan siyuan-note
The next generation PKM system, refactor your thinking.

China

@CodeXTF2
CodeX CodeXTF2
Red teamer and offensive dev. I pop shells and play tf2.

im in school lol userland

@YossiSassi
1nTh35h3ll YossiSassi
Red mind, Blue heart // The HAcktive Directory guy @ 10Root // People.Music.Code // Look.Think.Do // Knowledge is Power(shell)

10Root wherever I lay my IP

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@nyxgeek
nyxgeek nyxgeek
rebel scum, nerfherder, starbuck . hacker at @trustedsec

TrustedSec hacking gibsons

@zyn3rgy
Nick Powers zyn3rgy
Adversary Simulation @ SpecterOps

SpecterOps

@icyguider
icyguider icyguider
It's sipple out there!
@samyk
samy kamkar samyk
explo(r|it)ing boundaries

openpath security los angeles

@nmatt0
Matt Brown nmatt0
Hardware Hacker - I run arch btw - Soli Deo Gloria

/dev/ttys0

@EspressoCake
EspressoCake
Somewhere, doing something.
@RhinoSecurityLabs
Rhino Security Labs RhinoSecurityLabs
A boutique penetration testing and security assessment firm in Seattle, WA.

Seattle, WA

@mpgn
mpgn
̿ ̿̿'̿'\̵͇̿̿\=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿

France

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@hdm
HD Moore hdm
Founder of runZero, previously at Atredis Partners, Rapid7, Metasploit, and BreakingPoint.

@runZeroInc Austin, TX

@mubix
Rob Fuller mubix
Certified Checkbox Unchecker

@NoVAHackers Internets

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator
@jhaddix
Jason Haddix jhaddix
Father, hacker, blogger, gamer, & nerd. Bounty Hunter.

United States

@carnal0wnage
Chris Gates carnal0wnage
twitter: @carnal0wnage talks: http://www.slideshare.net/chrisgates blog: http://carnal0wnage.attackresearch.com/
@cobbr
Ryan Cobb cobbr

SpecterOps Dallas, TX

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@dirkjanm
Dirk-jan dirkjanm

Outsider Security The Netherlands

@yoda66
yoda66
Hack things I will. Train to let go of fear you must.
@rvrsh3ll
Steve Borosh rvrsh3ll
I hack code together and hope it works.

https://futuresec.io Gamma Quadrant 4

@martinvigo
Martin Vigo martinvigo
Security researcher | speaker | mentor | advocate. Hacking, building, breaking and writing on my blog. Founder of Triskel Security. Host of Tierra de Hackers.

Triskel Security Gali-Fornia

@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@byt3bl33d3r
Marcello byt3bl33d3r
T H I C C M A L W A R E

ProtectAI Error: Unable to resolve

@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@Flangvik
Melvin L Flangvik
Red Team at TrustedSec

TrustedSec Norway

@JLospinoso
Josh Lospinoso JLospinoso
Co-founder @ Shift5 Inc. Author of C++ Crash Course

Washington, DC

@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Security Researcher, Speaker, Microsoft MVP in Security

Podalirius Labs France

@LiveOverflow
LiveOverflow
wannabe hacker...
@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

0