💻
Hacking
Anything that can be used for good can be used for evil ⚡
Block or Report
Block or report gokupwn
Report abuse
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuse
memN0ps
Rust programming, hypervisor research & development, Windows internals, and reverse engineering. Member of @thesecretclub.
New Zealand
MrA7
3a7
A7. Certified Python Developer and on my way to the penetration testing world.
Follow Me On Instagram!
I do private program just DM me on IG.
A7 ANOTHER PLANET
localh0stt
localh0stt
Computer and Communication Networks Engineering | Cybersecurity Amateur
Abdulaziz Al-sharji
abdulaziz5alsharji
-Programmer
-Full Stack Developer (Django).
-Python
-C++
oman
Joas A Santos
CyberSecurityUP
Academic and Professional experience in Cyber Security / Red Team Leader / Information Security Researcher.
Brasil
Alaa Jaafar
Alaajaafar843
Full stack developer.
I still have a long way to go , but I'm already so far from where i used to be.
E-concepts Lebanon
kareem walid
kareemwalid
Cyber Security Engineer, Penetration tester, Bug Hunter
You'll find here some tools i wrote for personal use maybe will be in Python, PHP, NodeJs and bash
Ali El Hadi ISMAIL FAWAZ
hadifawaz1999
PhD Student at IRIMAS, Université de Haute-Alsace, MSD team @MSD-IRIMAS .
Core developer in @aeon-toolkit .
I work on Deep Learning for Time Series Analysis
Université de Haute-Alsace 12 rue des Frères Lumière 68 093 MULHOUSE
Cloasies
Cloasies
As the circle of what's known increases, contact with the unknown increases.
Tom Hudson
tomnomnom
Open-source tool maker, trainer, talker, fixer, eater, not really a sheep. He/him.
sbtUK Yorkshire, UK