Skip to content
View gsmith257-cyber's full-sized avatar
🦵
Not skipping leg day
🦵
Not skipping leg day

Highlights

  • Pro
Block or Report

Block or report gsmith257-cyber

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@paranoidninja
Paranoid Ninja paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting

Dark Vortex Last seen in Ring 0. Current Location Unknown

@gabriellandau
Gabriel Landau gabriellandau
WinDbg’er at @elastic security

Elastic Maryland

@aahmad097
aahmad097
Finding bugs and Cracking Stupid Jokes, and I am all out of Stupid Jokes.

@AtredisPartners @AtredisPartners

@rvrsh3ll
Steve Borosh rvrsh3ll
I hack code together and hope it works.

https://futuresec.io Gamma Quadrant 4

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@S4ntiagoP
infosec guy S4ntiagoP

CoreSecurity Metaverse

@OOAFA
Offensive Operations Against Foreign Adversaries OOAFA
A collection of tools useful for OOAFA engagements.
@helviojunior
Helvio Junior (M4v3r1cK) helviojunior
Malware and Security Researcher | OSCE3 | OSEP | OSED | OSCE | OSCP | OSWE | eCXD | eMAPT | CEH.

Curitiba, PR, Brazil

@susMdT
Dylan Tran susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman
@RedSiege
Red Siege RedSiege
Offensive Services from Offensive Minds
@nicholasaleks
Nick Aleks nicholasaleks
Hacker, Engineer, Author of Black Hat GraphQL & Black Hat Bash. Sr. Director of Security @ Wealthsimple & Co-Founder @ DEFCON Toronto (DC416)

Aleks Security Cyber Intelligence Toronto, Ontario - Canada

@saunders-jake
saunders-jake
US Cyber Team | Penetration Tester

Downscope Security Solutions

@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.
@Maldev-Academy
Maldev Academy Maldev-Academy
A comprehensive module-based malware development course providing fundamental to advanced level knowledge
@hackerhouse-opensource
Hacker House hackerhouse-opensource
Hacker House public computer security research.

hackerhouse 0.0.0.0/0

@NUL0x4C
NULL NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
@itm4n
Clément Labro itm4n
Pentest & Windows security research
@k3nundrum
k3nundrum k3nundrum
trying harder to pwn all the things

Red Seer Security Behind you

@Idov31
Ido Veltzman Idov31
I'm a security researcher and using this platform to share my projects and research :)

mov eax, [ebp+location]

@jenaye
H Mike jenaye
Red team operator for @Orange-Cyberdefense Creator of @matro7sh & michmich.eu

@Orange-Cyberdefense @Inshallhack @matro7sh Marseille

@djnnvx
djnn djnnvx
hacking is art

@Penthertz

@rootcathacking
rootcat rootcathacking
"Of course I won the fucking sword fight," Hiro says. "I'm the greatest sword fighter in the world.""And you wrote the software.""Yeah. That, too," Hiro says

rootcat

@Cracked5pider
5pider Cracked5pider
scamming threat actors. 19y/o
@lem0nSec
Angelo Frasca Caccia lem0nSec
Penetration Tester & Red Team Operator

Horizon Security Italy

@connormcgarr
Connor McGarr connormcgarr
OSCP, OSCE, OSEE | Exploit Development, Vulnerability Research, and Red Teaming.

@CrowdStrike United States of America

@nsacyber
NSA Cybersecurity Directorate nsacyber
Official GitHub account for NSA Cybersecurity Directorate. Formerly branded as NSA Cybersecurity, NSA Information Assurance, & Information Assurance Directorate

Fort Meade, MD

@SamuelTulach
Samuel Tulach SamuelTulach
Mostly interested in x86 architecture, UEFI environment, early boot stages of Windows, and HyperV. Likes to mess around with games' anti-cheats and DRM.

Czechia

@nopcorn
nopcorn nopcorn
I’m an Offensive Security Engineer that likes to research interesting security topics and break stuff.

@figment-networks Canada

@mpgn
mpgn
̿ ̿̿'̿'\̵͇̿̿\=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿

France

@crimsonskylark
crimsonskylark

Irithyll of the Boreal Valley

@memN0ps
memN0ps
Rust programming, hypervisor research & development, Windows internals, and reverse engineering. Member of @thesecretclub.

New Zealand

@matterpreter
Matt Hand matterpreter
Aut viam inveniam aut faciam

@preludeorg USA

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@fin3ss3g0d
Dylan Evans fin3ss3g0d
🔓 Master of the virtual heist. Unlocks cyber doors while wearing a white hat. OSEP-certified ethical hacker, converting caffeine ☕ and curiosity 🤔 into code.

United States

@sliverarmory
Sliver Armory sliverarmory
The finest collection of open-source armaments, curated for the aspiring cyberwar profiteer.
@SpecterOps
SpecterOps SpecterOps

United States of America

@w4fz5uck5
w4fz5uck5
~ Alexa | OSCP | OSCE | OSWE | RED Team Lead & Security Researcher

MOV AL, 0x11

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK