Skip to content
View kevin-valerio's full-sized avatar
👘
i/o
👘
i/o
Block or Report

Block or report kevin-valerio

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@dtolnay
David Tolnay dtolnay

0xF9BA143B95FF6D82 Redwood City, California

@geeknik
geeknik geeknik
Growing spicy peppers in the 405 whilst fuzzing all the 1s & 0s. Principal Vulnerability Researcher at spiderSilk. Formerly at OpenDNS.

spiderSilk USA

@ReverseApple
ReverseApple
Apple-related reverse engineering efforts, including tools and guides.
@spinpx
sp1npx spinpx
Security researcher & Fuzzer developer & Rustacean

FuzzAnything Shanghai

@abcSup
Zi Fan abcSup
Security Engineer, Reverse Engineer

Google

@gsingh93
Gulshan Singh gsingh93
Security Engineer at Google
@DavidKorczynski
DavidKorczynski
Researcher at @AdaLogics. Software security, analysis, AI and verification - PhD in program analysis from Oxford University

https://adalogics.com Oxford, UK

@publicqi
publicqi
Senior LEGO assembler.

@fuzzland

@g0h4n
Quentin Texier g0h4n
Pentester and Red Team Operator 🇫🇷

Bretagne, France

@eknoes
Sönke eknoes
PhD student @ University of Göttingen, Germany

Göttingen, Germany

@wtdcode
lazymio wtdcode
Learn, think, and break.

Singapore

@klecko
Klecko klecko
Pwn & rev

Hackiit

@OpenZeppelin
OpenZeppelin OpenZeppelin
The standard for secure blockchain applications
@paritytech-secops
Parity Technologies paritytech-secops
Solutions for a trust-free world

Germany

@Robbepop
Robin Freyler Robbepop
🦀Rustacean with C & C++ origins - Enthusiastic about WebAssembly, compiler technology, virtual machines & SAT solving.

Berlin

@Grub4K
Simon Sawicki Grub4K
I use Arch on WSL btw

Idstein, Germany

@ink-analyzer
ink! Analyzer ink-analyzer
ink! Analyzer is a collection of modular and reusable libraries and tools for semantic analysis of ink! smart contract code.
@trail-of-forks
Trail of Forks trail-of-forks
Forks of open source projects, by Trail of Bits!
@lifting-bits
Lifting Bits lifting-bits
Binary Translation by @trailofbits

New York, NY

@crytic
Crytic crytic
Blockchain Security, by @trailofbits

New York, NY

@AFLplusplus
Advanced Fuzzing League ++ AFLplusplus
We want to make fuzzing better and better

Europe

@dlehgus1023
Dohyun Lee dlehgus1023

Korea, Republic of

@h1994st
Shengtuo Hu h1994st
Think More, Do More, and Talk More :)
@eurecom-s3
eurecom-s3
Stand-alone projects developed by eurecom-s3. Make sure to also visit https://github.com/avatarone and https://github.com/avatartwo
@m4drat
Theodor Arsenij m4drat
💻 DTU. Security researcher, exploit developer and reverse engineer. Occasionally do Fintech :) Passionate about mountain biking and studying 😄

Passware Denmark, Copenhagen

@Resery
Resery Resery
PWN | Nepnep | Android & Tee Security Engineer | Xiaomi

Xiaomi

@Speykious
Speykious Speykious
Member of the Rust Evangelism Strike Force. Also I hate Java

The Internet

@nbars
Nils Bars nbars
Systems security researcher & PhD student @CISPA-SysSec / @RUB-SysSec

Ruhr-Universität-Bochum Bochum

@willmcgugan
Will McGugan willmcgugan
I'm a full-stack software developer and Python expert. CEO / Founder of Textualize. Creator of Rich, Textual, and @PyFilesystem.

Textualize Edinburgh, UK

@kdsjZh
Han Zheng kdsjZh
PhD Student at @HexHive

École Polytechnique Fédérale de Lausanne Lausanne

@SonicStark
Sonic SonicStark

localhost /dev/null