Skip to content
View KIMBIBLE's full-sized avatar
🎯
Focusing
🎯
Focusing
  • South.Korea

Block or report KIMBIBLE

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@GhostPack
GhostPack GhostPack
A collection of security related toolsets.
@Analyzer1x7000
Analyzer1 Analyzer1x7000
DFIR | Blue Team | Malware RE

USA

@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@alexandreborges
Alexandre Borges alexandreborges
Vulnerability Researcher | Exploit Developer
@aaaddress1
Sheng-Hao Ma aaaddress1
30cm.tw/me

TXOne Networks Inc. Taiwan

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@ChoiSG
Choi ChoiSG
Currently 해킹 for 삼겹살.
@0xor0ne
0xor0ne 0xor0ne
Cyber Security - Malware - Exploits - Embedded/IoT - C and Rust - Linux (kernel)

Europe

@guidedhacking
GuidedHacking guidedhacking
Reverse Engineering & Game Hacking Tutorials

United States of America

@mitre-attack
MITRE ATT&CK mitre-attack

United States of America

@hyunsikjeong
Hyunsik Jeong hyunsikjeong
Infosec researcher @theori-io. CTF player @perfectblue. Previously @SysSec-KAIST and @PLUS-POSTECH.

Theori Seoul, South Korea

@jsecurity101
Jonathan Johnson jsecurity101
Windows Internals Research and Telemetry Identification

USA

@kkent030315
kkent030315
Astronauts Engineer at NASA

@nasa

@MrEn1gma
Hai Nguyen MrEn1gma
Reverser/Malware is my liƒe.
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@RiotVanguard

@connormcgarr
Connor McGarr connormcgarr
OSCP, OSCE, OSEE | Exploit Development, Vulnerability Research, and Red Teaming.

United States of America

@XaFF-XaFF
XaFF XaFF-XaFF
Expert @ Googling stuff

Poland

@xalicex
Alice xalicex
Offsec and Stuff
@LordNoteworthy
Noteworthy LordNoteworthy
Conditionally married to malwares.
@daaximus
daax daaximus
technical research
@Shhoya
Shhoya_ Shhoya
D'oh

WonderPeople, Anti-Cheat Leader

@SinaKarvandi
Sina Karvandi SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@MiroKaku
MeeSong MiroKaku
[+] Modern C++ advocates and practitioners [+] Windows Kernel [+] Meow~

China

@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@hzqst
hzqst hzqst
Game Security & Game Engine & Realtime Rendering

Super Earth

@brianairb
Brian Pak brianairb

@theori-io Austin, TX

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@KOREAN139
Sanggu Han KOREAN139
Standard nerd

Imagoworks Seoul, Korea

@luxroot
Myeong-geun Shin luxroot
FuriosaAI SWE @furiosamg Master's KAIST SoftSec KITRI BoB 6th Vuln. track

KAIST SoftSec Seoul, Korea

@tsgates
Taesoo Kim tsgates

Georgia Tech Atlanta

@colah
Christopher Olah colah
I want to understand things clearly and explain them well. @openai formerly @brain-research.

San Francisco

@umbum
Sungbum Um umbum
Be a developer, not just a worker.

@naver financial