NSA Cybersecurity Directorate
nsacyber
Official GitHub account for NSA Cybersecurity Directorate. Formerly branded as NSA Cybersecurity, NSA Information Assurance, & Information Assurance Directorate
Fort Meade, MD
fastfire
fastfire
Cyber Security Team Leader @ Würth Phoenix, CPENT/CEH/CND/CSA/ECSA, owner of SATAYO CTI platform & deepdarkCTI project - member of
@Curatedintel
@WuerthPhoenix
BlackArch Linux
BlackArch
BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers.
Earth
CyberDefenders
cyberdefenders
Training platform for blue teams to test and advance their CyberDefense skills.
United States of America
Flutter
flutter
Flutter is Google's UI toolkit for building beautiful, natively compiled applications for mobile, web, desktop, and embedded devices from a single codebase.
Eclipse Adoptium
adoptium
The Adoptium Working Group promotes and supports high-quality runtimes and associated technology for use across the Java ecosystem
National Security Agency
NationalSecurityAgency
Official organization account for the National Security Agency (NSA)
United States
MDN Web Docs
mdn
Data and tools related to MDN Web Docs (formerly Mozilla Developer Network, formerly Mozilla Developer Center...)
Worldwide
Prashant Kumar Pandey
LearningJournal
Full time Software Architect, Consultant, Learner, Author, and part time Trainer at Bangalore, India.
Learning Journal India
Mr.Un1k0d3r
Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r
RingZer0 Team
Heath Adams
hmaverickadams
https://tcm-sec.com
https://breachpoint.com
https://thecybermentor.com
https://youtube.com/c/thecybermentor
Matthias J. Sax
mjsax
Software Engineer | Kafka Streams | Apache Committer and PMC member (Kafka, Flink, Storm)
@confluentinc Reno, NV
Cybersecurity and Infrastructure Security Agency
cisagov
Commit today, secure tomorrow.
United States of America
CVE Program
CVEProject
The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
PreviousNext