Skip to content
View W3ndige's full-sized avatar
🐱
🐱
Block or Report

Block or report W3ndige

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@jdu2600
John U jdu2600

Canberra, Australia

@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@stong
cts stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue. Previously @Vector35, @sslab-gatech.

@Zellic 0x4141414141414141

@ionescu007
Alex Ionescu ionescu007
VP of EDR Strategy at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http:https://www.alex-ionescu.com

Winsider Seminars & Solutions Inc.

@marcan
Hector Martin marcan
If it ain't broke, I'll fix it!

Tokyo, Japan

@Wildenhaus
Haus Wildenhaus
AI, Algorithmic Trading, and Reverse Engineering.

Nashville, USA

@SamuelTulach
Samuel Tulach SamuelTulach
Mostly interested in x86 architecture, UEFI environment, early boot stages of Windows, and HyperV. Likes to mess around with games' anti-cheats and DRM.

Czechia

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@corkamig
Ange Albertini corkamig
Security Engineer

Google

@AlexAltea
Alexandro Sanchez AlexAltea
Security, reversing, mathematics. Writing emulators and hypervisors.

Astral Technologies Les Escaldes, Andorra

@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@xalicex
Alice xalicex
Offsec and Stuff
@kspalaiologos
Kamila Szewczyk kspalaiologos
wannabe mathematician, array lang & low level programming; 20yo girl

Germany

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@dr4k0nia
drakonia dr4k0nia
Security Researcher specializing in .NET malware analysis and tooling

Germany

@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@nazywam
Michał Praszmo nazywam
https://twitter.com/nazywam

@CERT-Polska Poland

@jbremer
Jurriaan Bremer jbremer

CEO @hatching Amsterdam

@elManto
Alessandro Mantovani elManto
I am elmanto, I work in the security field at Qualcomm. I got my PhD at Eurecom. My interests include several areas of system security (program analysis, ..)

Qualcomm California

@malpedia
Malpedia malpedia
Team account for the Malpedia project.

Fraunhofer @fkie

@KiFilterFiberContext
KiFilterFiberContext
undergrad student interested in windows internals

unemployed United States

@NtRaiseHardError
dtm NtRaiseHardError
Self-taught Windows wannabe reverse engineer

@0x00sec Someone's basement

@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@amzn

@ElektroKill
ElektroKill ElektroKill
18-year-old self-taught developer and reverse engineer. My preferred language of choice is C#.

Poland

@matterpreter
Matt Hand matterpreter
Aut viam inveniam aut faciam

@preludeorg USA

@disconnect3d
Disconnect3d disconnect3d
Security Engineer, dev, ctf player

@trailofbits world / krk.

@dguido
Dan Guido dguido

Trail of Bits New York, NY

@arnaugamez
Arnau arnaugamez
Hacker & Mathematician. Security engineer @ $company. Research & Education @FuraLabs. Community @HackingLliure.
@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@whitequark
Catherine whitequark
the catgirl knows where it is at all times

@ChipFlow UK

@therealdreg
Dreg therealdreg
Senior Malware Researcher, OS Internals, C/C++, assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC

rootkit.es Spain

@ioncodes
Layle | Luca ioncodes
part time stack frame counterfeiter

0x41414141

@thebabush
thebabush thebabush
cat /dev/urandom

@mhackeroni