Skip to content
View 0xricksanchez's full-sized avatar
🔥
debugging life
🔥
debugging life

Highlights

  • Pro
Block or Report

Block or report 0xricksanchez

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@sslab-gatech
gts3.org (SSLab@Gatech) sslab-gatech
https://gts3.org

School of Computer Science, Georgia Tech

@gsingh93
Gulshan Singh gsingh93
Security Engineer at Google
@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@androidoffsec
Android Offensive Security androidoffsec
Android Offensive Security @ Google
@airbus-cyber
Airbus CyberSecurity airbus-cyber
Airbus CyberSecurity protects governments, military, organisations and critical national infrastructure from cyber threats.

Elancourt, France

@jonathanmetzman
jonathanmetzman
Security engineer working on open source and Chrome security

Google

@l33d0hyun
Dohyun Lee l33d0hyun

Korea, Republic of

@xairy
Andrey Konovalov xairy
Linux kernel security engineer.
@pedrib
Pedro Ribeiro pedrib
1337

Agile Information Security London, United Kingdom

@facebookexperimental
Meta Experimental facebookexperimental
These are Meta projects that are not necessarily used in production but are being developed in the open nevertheless.

Menlo Park, California

@ptr-yudai
Yudai ptr-yudai
https://bitbucket.org/ptr-yudai/

Japan

@a13xp0p0v
Alexander Popov a13xp0p0v
Linux Kernel Developer & Security Researcher. This is my personal account.
@smallkirby
smallkirby smallkirby
a

**CENSORED** Kyoto, Japan

@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@hardik05
Hardik Shah hardik05
security researcher.

bangalore

@vanhauser-thc
van Hauser vanhauser-thc
Security researcher since 1994 https://www.mh-sec.de/ https://www.thc.org/

The Hacker's Choice | mh-sec | me | myself Berlin

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@ifratric
Ivan Fratric ifratric
Google Project Zero member

@google

@andreafioraldi
Andrea Fioraldi andreafioraldi
Writing fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.

Antibes, France

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@richinseattle
richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ http:https://fuzzing.io; hacking the planet since 1995; Undercurrents BOFH
@maxpl0it
maxpl0it maxpl0it
Security researcher focusing on browsers and routers

London, England

@wrongbaud
wrongbaud wrongbaud
Embedded Systems Reverse Engineer

voidstarsec.com MA

@NytroRST
Ionut Popescu NytroRST
Interested in C/C++, ASM, Windows internals, reverse engineering, exploit and shellcode development

Romania

@hugsy
crazy hugsy hugsy
Exploit Dev & OffSec Tool Dev

@blahcat Ring0

@ptresearch
Positive Research ptresearch Suspended

Positive Research Team

@Microsvuln
Microsvuln
¯\_(ツ)_/¯ 阿拉什 !

Germany

@SinaKarvandi
Sina Karvandi SinaKarvandi
Debuggers enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@gannimo
Mathias Payer gannimo
Mathias Payer is a security researcher and professor at the EPFL, leading the HexHive group.

EPFL Lausanne