Skip to content
View fantasy0x1's full-sized avatar
:octocat:
><
:octocat:
><
Block or Report

Block or report fantasy0x1

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@lem0nSec
Angelo Frasca Caccia lem0nSec
Penetration Tester & Red Team Operator

Horizon Security Italy

@iPower
iPower iPower
Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @thesecretclub.

Mom's basement

@rogxo
Rog rogxo
C/C++, Reverse Engineering, Disassembly, Windows Internals & Low-level stuff, Exploitations, Penetration Test and more...

Reverse Engineering Co. Ltd. Metaverse

@disconnect3d
Disconnect3d disconnect3d
Security Engineer, dev, ctf player

@trailofbits world / krk.

@justinmk
Justin M. Keyes justinmk
"People are afraid to merge." - Less Than Zero

Berlin

@tjdevries
TJ DeVries tjdevries
Software developer. I like using Neovim (core team) and stream here: https://www.twitch.tv/teej_dv
@bronson113
Bronson Yen bronson113
Cybersecurity B.S. @ Purdue / CTF Player (@b01lers / @XxTSJxX)
@Kyle-Kyle
Kyle Zeng Kyle-Kyle
VGhpcyBpcyBhIGdlZWt5IG5vb2IuLi4=

Shellphish

@WinMin
swing WinMin
Focus on Vulnerability Discovering and as CTF Player @FlappyPig @r3kapig

@chaitin Beijing,China

@l0kihardt
lokihardt l0kihardt
Independent Security Researcher, Pentester, Former CTF Player @FlappyPig @r3kapig. Also a big fan of lokihardt. Now focusing on **Finance** and **Quant**.

TaiPei China

@A7um
Atum A7um

Peking University Beijing, China

@Mem2019
2019 Mem2019
PhD@IUB

Bloomington

@stypr
Harold Kim stypr
in favor of writing low quality codes.
@Ch0pin
+Ch0pin Ch0pin
Security Researcher, Malware Addict, Former Camel Rider

Microsoft /dev/null

@TFNS
The Flat Network Society TFNS
High quality steganographers

From all corners of the network

@r3kapig
r3kapig
United Team of Eur3kA and FlappyPig
@yuguorui
Guorui Yu yuguorui

Alibaba Cloud Hangzhou, CN

@sahuang
Xiaohai Xu sahuang
Software Engineer @microsoft / Founder @project-sekai-ctf / Former open-source developer @milvus-io

Microsoft Vancouver, Canada

@khokho
Aleksandre Khokhiashvili khokho
...

OtterSec Georgia, Tbilisi

@andreafioraldi
Andrea Fioraldi andreafioraldi
Writing fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.

Antibes, France

@mebeim
Marco Bonelli mebeim
Security researcher

Italy

@peperunas
Giulio De Pasquale peperunas
I’m a Ph.D. candidate in Computer Security at King’s College London. My main interests include reverse engineering, automated program analysis, and obfuscation.

Santa Barbara

@dp1
Dario Petrillo dp1
Competitive programmer && CTF player with @TheRomanXpl0it / @mhackeroni

Sapienza Università di Roma Roma, Italy

@ocean1
_ocean ocean1

Exception Level 0

@crazymanarmy
crazyman crazymanarmy
a noob member in @r3kapig the leader of @ShadowChasing1

r3kapig

@Hackndo
Pixis Hackndo
Security blog author https://hackndo.com

Login Sécurité Paris

@0x00-0x00
Andre Marques (zc00l) 0x00-0x00
Penetration Tester, OSCP.

Personal Profile Lisbon, Portugal

@reu
Rodrigo Navarro reu

@netvacinas Santa Bárbara D'Oeste, São Paulo, Brasil

@racerxdl
Lucas Teske racerxdl
I am because we are.

@tesmustech São Paulo, SP, Brasil

@xapenny
白鷺シオナ xapenny
むぎゅ~

中国原神大学 鳥白島

@KpwnZ
xia0o0o0o KpwnZ
Write some shit code. CTF with @W4terDr0p / @S1uM4i / @r3kapig. Interested in security research. Currently at UC San Diego.

Exception level 3

@joaoviictorti
João Victor joaoviictorti
I hack things

127.0.0.1

@therealdreg
Dreg therealdreg
Senior Malware Researcher, OS Internals, C/C++, assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC

rootkit.es Spain

@ReVanced
ReVanced ReVanced
Continuing the legacy of Vanced
@h4x0r-dz
h4x0r_dz h4x0r-dz
h4x0r_dz

tf3il Algeria

@Insomnihack
Insomni'hack Insomnihack
Insomnihack CTF group
@h2hconference
Hackers 2 Hackers Conference h2hconference
Hackers To Hackers Conference (H2HC) é uma conferência organizada por pessoas que trabalham ou que estão diretamente envolvidas com pesquisas e desenvolvimento

H2HC Brazil

@infosec-au
Shubs infosec-au
halcyon

Assetnote Australia

@wsummerhill
Will Summerhill wsummerhill
Red team consulting & malware dev

Canada

@hugsy
crazy hugsy hugsy
OffSec Tool Dev Jedi Yet Another @blahcat

Ring0

@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@david942j
david942j david942j
david942j @ 217

Google Taiwan

@CosmodiumCS
Cosmodium CyberSecurity CosmodiumCS
The Official Cosmodium CyberSecurity GitHub Page

United States of America