Skip to content
View checkdock's full-sized avatar

Block or report checkdock

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@memN0ps
memN0ps
Security Research & Development - Rust | RE | Windows Internals | @thesecretclub

New Zealand

@joshfaust
Josh Faust joshfaust
I build code for many things, Malware Dev/Research (red team stuff), non-profits that need some extra help, and anything else that gets me down a rabbit hole.
@momentum-mod
Momentum Mod momentum-mod
A standalone game built on the Source Engine centralizing movement game modes found in Counter-Strike, Team Fortress, Half-Life 2, Titanfall, and Quake.

Source Engine

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Security Researcher, Speaker, Microsoft MVP in Security

Podalirius Labs

@watchtowrlabs
watchTowr Labs watchtowrlabs
Labs division of watchTowr
@nomi-san
Nguyen Duy nomi-san
Full-stack, but interesting in reverse engineering and low-level things.

Vietnam

@flechablanca19
Flechablanca19 flechablanca19
IaC | Terraform | Docker | Git | Bash | Linux | Windows | K8S| Proxmox | VMware | Ansible | Yamel | Python | Scripting

Encripted_IA

@LiveOverflow
LiveOverflow
wannabe hacker...
@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(x(x_(x_x(O_o)x_x)_x)x)

@DamonMohammadbagher
Damon Mohammadbagher DamonMohammadbagher
Security Researcher "https://damonmohammadbagher.github.io" , "https://medium.com/@DamonMohammadbagher"
@bigb0sss
bigb0ss bigb0sss
OSWE | OSCE | OSCP | Lead Offensive Security Engineer - Pentesting, RedTeam, ExpDev, Application Security

\x90\x90

@phra
Francesco Soncina phra
OSCE // OSCP // Ethical Hacker & Red Teamer // Full Stack Developer // JavaScript Enthusiast // Staff Member of @BolognaJS // CTF player at @d0nkeys

@d0nkeys @BolognaJS Amsterdam, NL

@dirkjanm
Dirk-jan dirkjanm

Outsider Security The Netherlands

@med0x2e
Mohamed El Azaar med0x2e
RedTeamer & Security Researcher, used to be a Software Engineer/Developer, Manga/Anime Otaku

Yo. 127.0.0.1

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@xct
xct xct
Hobby ⚑ Collector

Berlin | Tokyo

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@NullArray
Vector Security NullArray
Cyber Security Practitioner and Developer. Passionate about Open Source Software. Intel & Security Automation, Malware R&D, InfoSec Awareness and Education.

@GreySec-Security-Forums International Hackersphere

@hausec
Hausec hausec
script kiddie extraordinaire

@haus3c

@homjxi0e
Harr0ey homjxi0e
Red Teamer | Security researcher
@vulnersCom
Vulners Team vulnersCom
New generation vulnerability intelligence database

Vulners

@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator
@jaredhaight
Jared Haight jaredhaight

Trimarc Security San Diego, CA

@rvrsh3ll
Steve Borosh rvrsh3ll
I hack code together and hope it works.

https://futuresec.io Gamma Quadrant 4

@byt3bl33d3r
Marcello byt3bl33d3r
T H I C C M A L W A R E

ProtectAI Error: Unable to resolve

@digininja
Robin Wood digininja
Hacker, coder, climber, runner. Co-founder of the SteelCon conference.

UK

@DanMcInerney
Dan McInerney DanMcInerney
Lead AI Security Researcher at Protect AI

@danhmcinerney

@netbiosX
netbiosX netbiosX
Director of Pentest Laboratories

PentestLab London

@sailay1996
valen sailay1996
hackthebox.eu/profile/1467

Myanmar