Skip to content
View Bronzekal's full-sized avatar

Block or report Bronzekal

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@Evilcry
Giuseppe Bonfa Evilcry

ReaQta Netherlands

@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex | 🇺🇦 Ukraine needs your help to kill Ruϟϟian zombies: 🔗 savelife.in.ua/en/donate 💪
@swwwolf
swwwolf swwwolf
Virii Cthulhu, Malware Expert at Kaspersky Lab, R&D, anti-rootkit, Windows internals, debugging, articles, etc...

swwwolf Russian Federation

@therealdreg
Dreg therealdreg
Senior Malware Researcher, OS Internals, C/C++, assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC

rootkit.es Spain

@ntddk
Yuma Kurogome ntddk
ᵖˢᵉᵘᵈᵒ⁻ˢᶜᶦᵉⁿᶜᵉ ᵃⁿᵈ ᶠˡʸᶦⁿᵍ ᵖᶦᵍˢ.

Tokyo, Japan

@Fyyre
Fyyre Fyyre
Old school, expert reverse code engineer.
@bytecode77
Martin Fischer bytecode77
Software Developer & IT Security Expert

Germany

@waleedassar
waleedassar
Open for job offers.

Egypt

@winsiderss
Winsider Seminars & Solutions, Inc. winsiderss
Windows Internals Tools from Winsider

Canada

@dahall
David Hall dahall
I've been writing and designing code for over 25 years for both commercial and open source use. I work as a CTO for a tech firm.

United States

@dmex
dmex dmex
Steven G

Australia

@TETYYS
tetyys TETYYS
THERE IS NEVER TOO MUCH SECURITY

MSP™©® tetyys

@diversenok
diversenok diversenok
Aspiring Windows security researcher & system programmer; student.

The Netherlands

@AzAgarampur
Arush Agarampur AzAgarampur
I enjoy Windows internals, low-level development, reverse engineering, and offensive security

California

@darkr4y
D@rkR4y. darkr4y
cyber sec enthusiast. now its time to pentest! ٩(•̤̀ᵕ•̤́๑)

Pand0ra Origin

@processhacker
Process Hacker processhacker
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.

Australia

@young-developer
Oleksii Maryshchenko young-developer
setAmazingLife(true) || setLife(new AmazingLife())

Oleksii Maryshchenko Wroclaw, Poland

@hmartinez82
Hernan Martinez hmartinez82
C++/C# developer during the day, Windows on ARM64 enthusiast at night. Trying to contribute to open-source projects when possible.

Malwarebytes Corporation Denver, CO

@LordNoteworthy
Noteworthy LordNoteworthy
Conditionally married to malwares.
@lawndoc
C.J. May lawndoc
Information security professional and passionate programmer. I love to learn by doing personal projects in my free time. Check out my top repos!

Vermeer Corporation United States

@cyb3rxp
Cyb3R><P cyb3rxp
Cyber experiment, or experience, I don't remember... Philippe V.: Cybersecurity engineer, manager and trainer

france

@ANSSI-FR
ANSSI ANSSI-FR

Paris, France

@SafeBreach-Labs
SafeBreach Labs SafeBreach-Labs
SafeBreach Labs

Worldwide

@qi4L
qi4L
工欲善其事,必先利其器。

香港科技大学

@qwqdanchun
簞純 qwqdanchun
我惭携宝剑,只为看山来

China

@XiaoliChan
XiaoliChan XiaoliChan
Loading error, code: 404

::/0

@simsor
Simon Garrelou simsor
Forensics / Incident Response / Golang & Python

@airbus-cert Toulouse, France

@itaymigdal
Itay Migdal itaymigdal
Cyber Security geek
@BushidoUK
BushidoToken BushidoUK
Security Researcher

@curated-intel

@y11en
y11en y11en
1F Y0U CAN'7 H0DL, Y0U W1LL N0T 8E P00R

@y11en

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team