Skip to content
View cmprmsd's full-sized avatar
Block or Report

Block or report cmprmsd

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Beijing

@icyguider
icyguider icyguider
It's sipple out there!
@Ana06
Ana María Martínez Gómez Ana06
:octocat: | Reverse Engineer @mandiant | MS in Computer Science @columbia University, Theory specialization | "La Caixa" fellowship holder | FOSS enthusiast

@mandiant @google Germany

@lkarlslund
Lars Karlslund lkarlslund
Curious Security Minded Octopus, freelance security consultant, loves Active Directory, finding holes in the cheese, coding Golang, ntlm.pw

NetSection Security Denmark

@Leo4j
Rob Leo4j
Active Directory, Red Teaming, and Network Security
@matterpreter
Matt Hand matterpreter
Aut viam inveniam aut faciam

@preludeorg USA

@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@tomnomnom
Tom Hudson tomnomnom
Open-source tool maker, trainer, talker, fixer, eater, not really a sheep. He/him.

sbtUK Yorkshire, UK

@kymb0
kymb0
"In my attempt to avoid the work, I came up with a less elegant solution." ᚨ

Ionize Mars

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@gtworek
Grzegorz Tworek gtworek
https://linkedin.com/in/grzegorztworek
@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator
@moloch--
Joe moloch--
I like computers.

Hacker / Programmer Earth

@samratashok
Nikhil "SamratAshok" Mittal samratashok
Founder of Altered Security, Hacker, InfoSec Professional, PowerShell and AD pwner, Creator of Kautilya and Nishang :)

Altered Security

@dwisiswant0
Dwi Siswanto dwisiswant0
Building @teler-sh | Security R&D | Bashturbation

@projectdiscovery Jakarta, Indonesia

@berdav
Davide Berardi berdav

Budrio, Bologna, Italy

@awgh
awgh
https://www.symbolcrash.com

Symbol Crash

@xCrashsystemx
Marko Kozlowski xCrashsystemx
IT Student @ FH Aachen. Dev @ Networkstars.de

Networkstars.de Aachen

@mubix
Rob Fuller mubix
Certified Checkbox Unchecker

@NoVAHA Internets

@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex | 🇺🇦 Ukraine needs your help to kill Ruϟϟian zombies: 🔗 savelife.in.ua/en/donate 💪
@Bo0oM
Anton Lopanitsyn Bo0oM
https://twitter.com/i_bo0om

Russia

@coreb1t
@coreb1t (twitter) coreb1t
Pentester. Bug Hunter.