Skip to content
View ro0kie3's full-sized avatar
🎯
专注
🎯
专注
Block or Report

Block or report ro0kie3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@sourceincite
Source Incite sourceincite

Source Incite Mérida

@FSecureLABS
F-Secure LABS FSecureLABS

Basingstoke, Johannesburg, London, Manchester, Singapore, New York

@W01fh4cker
W01fh4cker W01fh4cker
Doubt is the key to knowledge.
@HXSecurity
HXSecurity HXSecurity
火线安全 - 云安全社区

China

@AabyssZG
曾哥 AabyssZG
弱小和无知不是生存的障碍,傲慢才是!

Aabyss Team China

@Amulab
御守实验室 Amulab
中安网星御守实验室(Amulab)是隶属于中安网星的纯技术研究团队。主要职能包括横向移动研究、AD域安全研究、Windows安全研究等前瞻攻防技术预研、工具孵化,为产品输出安全能力。

China

@0xf4n9x
M4rtin Hsu 0xf4n9x
CyberSec Enthusiast, Security Researcher, RedTeam, Security Automation, ❣️OpenSource
@tkmru
@tkmru tkmru
電脳ケロちゃん / Co-Founder & CTO of Sterra Security Co.,Ltd. / Black Hat EUROPE 2021-2022 Arsenal / Black Hat USA 2020-2021 Arsenal / Metasploit GSoC 2017

Japan

@QAX-A-Team
QAX A-Team QAX-A-Team
QAX A-TEAM is a research team affiliated with Qi An Xin Group. Committed to Web security, APT offensive and defensive, forward-looking attack and defense tools
@nullbind
Scott Sutherland nullbind
Twitter: @_nullbind http:https://www.netspi.com/blog/author/ssutherland/ http:https://www.slideshare.net/nullbind

@NetSPI

@MythicMeta
Mythic Meta Configuration Information MythicMeta
Docker Templates and PyPi Package Source Code used in Mythic
@S1ckB0y1337
Nikos Katsiopis S1ckB0y1337
Im nobody....

EY Greece

@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@xelemental
Elemental X xelemental
Programming & Reverse Engineering || Founder @RixedLabs

@RixedLabs India

@infosecn1nja
Rahmat Nurfauzi infosecn1nja
Security Researcher/Red/Purple Teaming/Adversary Simulation/Threat Hunter. Contributors of Atomic Red Team, PS Empire, MITRE ATT&CK Framework, LOLBas, and more.

Jakarta, Indonesia

@SaadAhla
d1rk SaadAhla
Security researcher, malware dev
@0xTriboulet
Steve S 0xTriboulet
All code, software, writeups, and resources of any kind made available on my profile are under the AGPLv3 license unless otherwise noted.
@Mayfly277
Mayfly Mayfly277
Testeur de stylo :p

@Orange-Cyberdefense les internets

@memN0ps
memN0ps
A security researcher focused on specializing in Rust, hypervisor development, Windows internals, and reverse engineering. Member of @thesecretclub.

New Zealand

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@Tas9er
Tas9er
Code And Web Security

A.E.0.S

@paranoidninja
Paranoid Ninja paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting

Dark Vortex Last seen in Ring 0. Current Location Unknown

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@L4ys
Lays L4ys
Lazy Security Researcher

@TrapaSecurity Taiwan

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@GetRektBoy724
Hannn GetRektBoy724
just another weird kid messing with computers.

Indonesia

@timip
tiptiptip timip
Security and Splunk enthusiast

Timlab Hong Kong / San Francisco

@TryGOTry
Try TryGOTry
一个搞安全的菜鸡脚本小子罢了。

[email protected]

@0xjustBen
Ben 0xjustBen
Voledemort sought power, I seek offensive knowledge

pid:0