Discovering
BugHunter@OverSpace /
RedTeamer@PolarisLab /
CTFer@kn0ck
- Singapore
- https://t.zsxq.com/08HUtmIfb
Highlights
Block or Report
Block or report zer0yu
Report abuse
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuse
0xor0ne
0xor0ne
Cyber Security - Malware - Exploits - Embedded/IoT - C and Rust - Linux (kernel)
Europe
Keran Mu
mukeran
NISL, Tsinghua University | Redbud | Web Security & Protocol Security Researcher
Tsinghua University
eurecom-s3
Stand-alone projects developed by eurecom-s3. Make sure to also visit https://github.com/avatarone and https://github.com/avatartwo
Nguyen Duy
nomi-san
Full-stack, but interesting in reverse engineering and low-level things.
Vietnam
ExpoSE Symbolic Execution
ExpoSEJS
An instrumentation-based dynamic symbolic execution engine for JavaScript, developed at Royal Holloway, University of London
London, United Kingdom
Tod Beardsley
todb
Hacker, speaker, researcher, fed, election judge, Metasploit collaborator, @AustinHackers founder, vulnerability discloser, AKA @todb-cisa / @todb-r7
Huge Success, LLC Austin, TX
Gaspare Ferraro
GaspareG
@CyberChallengeIT & @OliCyberIT Organizer 💻 | CTF Player @ZenHackTeam 🚩 | @ReplyChallenges Organizer 🏆|
Cybersecurity National Laboratory Genoa
Tasos Laskos
Zapotek
@Ecsypno Single Member PC Greece
rs0n
R-s0n
☑ CISSP | OSWE
☑ AppSec Engineer
☑ Security Researcher
☑ Full-stack Developer
Security Engineering Manager Houston, TX
PreviousNext