Skip to content
View kcufId's full-sized avatar
Block or Report

Block or report kcufId

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@keowu
João Vitor keowu
Security Researcher | i like All OS Internals(except Mac), Malware & Reverse Engineering, C++, Intel Assembly and cool things | Jesus Follower

@Fluxuss-Tool-Tech Shizuoka

@RalfHacker
Ralf RalfHacker
Pentest, Red Team, MalDev
@Zhuagenborn
Zhuagenborn Zhuagenborn
Software Development | Artificial Intelligence | Reverse Engineering.

China

@ProcessusT
Processus ProcessusT
Ingénieur sécurité & Microsoft Security MVP 💻 CEH | OSCP | RTO | CRTE | PNPT | Speaker @LeHack

Les tutos de Processus Reims, France

@xwings
xwings xwings
Founder of Qiling Framework

Qiling Framework Georgetown, Penang

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@kleiton0x00
kleiton0x00 kleiton0x00
Yet another infosec guy.

Austria

@HyperSine
HyperSine
I seek truth.
@ddgksf2013
Cuttlefish ddgksf2013
得られないものは常に騒いでいる!
@zeroSteiner
Spencer McIntyre zeroSteiner
Information Security Research & Development

Rapid7 Cleveland, Ohio

@swwwolf
swwwolf swwwolf
Virii Cthulhu, Malware Expert at Kaspersky Lab, R&D, anti-rootkit, Windows internals, debugging, articles, etc...

swwwolf Russian Federation

@jackhumbert
Jack Humbert jackhumbert
Owner of OLKB, Founder of QMK https://olkb.com, https://qmk.fm

@olkb, @qmk Indiana

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@hosch3n
hosch3n

HongKong

@BlackINT3
BlackINT3
Binary RE & Vulnerability.
@killvxk
killvxk
在你面前的是:大宗师,大德鲁伊,屠魔者,死亡领主,大领主,大法师,先知,大祭司,战争领主,虚空领主,狩猎大师,暗影之刃,奈非天,白狼,昆特牌的大师,猎魔人,守望先锋成员,单排吃鸡者。

USSR

@brannondorsey
Brannon Dorsey brannondorsey
Artist | Programmer | Researcher

@runwayml Philadelphia, PA

@L4ys
Lays L4ys
Lazy Security Researcher

@TrapaSecurity Taiwan

@krisnova
Kris Nóva krisnova
You should never run my code.

@github

@LoRexxar
LoRexxar LoRexxar
QAX TianGong Team/Vidar-Team
@fatedier
fatedier
To be yourself.

SH,China

@grayddq
咚咚呛 grayddq
一位喜欢原创的安全工作者!
@ToyoDAdoubiBackup
ToyoDAdoubiBackup
Unofficial Backup of ToyoDAdoubi
@sairson
SaiRson sairson
#PenTest | #RedTeam | #Student | #Universe dev (Current)

Universe/v2

@Al1ex
Al1ex Al1ex

Heptagram Chengdu

@TheKingOfDuck
鸭王 TheKingOfDuck
Infosec Researcher|Security Developer|Java|Python|Golang|C++|React|Vue.js

废物收容所

@cbwang505
cbwang505 cbwang505
始于C#,精于C&C++,醉心于Windows内核与Com组件安全研究

ZheJiang Guoli Security Technology China ZheJiang Ningbo

@abatchy17
Mohamed Shahat abatchy17
Security researcher

Vancouver, BC