Skip to content
View gavz's full-sized avatar
Block or Report

Block or report gavz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@RangeNetworks
Range Networks RangeNetworks
Open Source Cellular Infrastructure

Santa Clara, California

@dcdelia
Daniele Cono D'Elia dcdelia
Tenure-track assistant professor at Sapienza University of Rome. Software & systems security

Sapienza University of Rome

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@moiji-mobile
moiji-mobile.com moiji-mobile
Leading provider of FOSS GSM, 3G, LTE core network components

Amsterdam

@Maldev-Academy
Maldev Academy Maldev-Academy
A comprehensive module-based malware development course providing fundamental to advanced level knowledge
@revng
rev.ng revng
We're building the next generation decompiler. Binary analysis is a dish best served static.
@bellingcat
Bellingcat bellingcat
An independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research.
@hackerhouse-opensource
Hacker House hackerhouse-opensource
Hacker House public computer security research.

hackerhouse 0.0.0.0/0

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@trailofbits
Trail of Bits trailofbits
More code: binary lifters @lifting-bits, blockchain @crytic, forks @trail-of-forks

New York, New York

@PentHertz
PentHertz PentHertz
RF and Hardware security company

Paris

@DarkFlippers
DarkFlippers
Alternative software for Flipper
@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@Cracked5pider
5pider Cracked5pider
scamming threat actors
@cn0xroot
HackSmith cn0xroot
大头 大头 下雨不愁

null 127.0.0.1

@RUB-SysSec
Chair for Sys­tems Se­cu­ri­ty RUB-SysSec

Ruhr University Bochum Bochum, Germany

@chip-red-pill
uCode Research Team chip-red-pill
Research Team Members: Dmitry Sklyarov (@_Dmit), Mark Ermolov (@_markel___), Maxim Goryachy (@h0t)

Moscow

@samyk
samy kamkar samyk
explo(r|it)ing boundaries

openpath security los angeles

@vmcall
vmcall

@thesecretclub

@asLody
Lody asLody
Just a boy