Skip to content
View OrShazam's full-sized avatar
🦧
Focusing
🦧
Focusing

Block or report OrShazam

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@EgeBalci
Ege Balcı EgeBalci
Security Researcher

PRODAFT Den Haag, Netherlands

@enkomio
Antonio Parata enkomio
Code Monk

enkomio-sponsor Italy

@retr0reg
Patrick Peng retr0reg
Memory-Security on C/Python | Founder @Protosec-Research | 15

Avon, CT

@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@karpathy
Andrej karpathy
I like to train Deep Neural Nets on large datasets.

Stanford

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@google
Google google
Google ❤️ Open Source

United States of America

@HexRabbit
HexRabbit HexRabbit
It takes all the pwning you can do, to keep in the same place.

Taiwan

@gaasedelen
gaasedelen
turning over rocks and finding nothing is still progress.
@yuawn
YC yuawn
former CTFer @balsn @DoubleSigma.

NTU master of CS Taipei, Earth, Milky Way Galaxy

@iPower
iPower iPower
Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @thesecretclub.

Mom's basement

@y0ny0ns0n
y0ny0ns0n y0ny0ns0n
Looking for bugs in haystack
@saaramar
Saar Amar saaramar
Reversing, exploits, {Windows, Hyper-V, iOS} internals, mitigations.
@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@Xyrem
Aryan Xyrem
I like exploring and breaking stuff.
@MrSynAckSter
MrSynAckSter MrSynAckSter
NYC based security hacker. Obsessions include exploit development, reverse engineering, machine learning, SAT solvers, biohacking, and high performance compute

Leviathan Security NYC

@0xatul
Atul 0xatul

Haxx Inc Localhost

@zardus
Yan Shoshitaishvili zardus
Former DEFCON CTF org. Captain Emeritus, @shellphish. Assoc Professor in Cybersecurity at @ASU. Director, American Cybersecurity Education Inst. @angr hacker.

Tempe, AZ, USA

@mahaloz
Zion Leonahenahe Basque mahaloz
Native Hawaiian | PhD Student @sefcom in Comp Sci | Prev Co-captain @shellphish | Decompiler Research

Arizona State University

@dkdna
Anand Balaji dkdna
Systems Security Researcher | DEFCON CTF Finalist '22. '23
@0xeb
Elias Bachaalany 0xeb
** YouTuber ** Author: Batchography ** Co-author: Practical Reverse Engineering & Antivirus Hacker's Handbook.
@borzacchiello
borzacchiello
PhD. Writing symbolic execution engines and program analysis related stuff
@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@yrp604
_yrp yrp604

Vancouver, BC

@repnz
Ori Damari repnz
windows kernel research & development

0x7c00

@ionescu007
Alex Ionescu ionescu007
VP of EDR Strategy at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and https://www.alex-ionescu.com

Winsider Seminars & Solutions Inc.

@farazsth98
Faith farazsth98
Lead Cosmos Security Engineer @Zellic, Independent Vulnerability Researcher

Zellic Perth, WA

@JeremyFetiveau
Jeremy Fetiveau JeremyFetiveau

always a different country