Skip to content
View AdministratorGithub's full-sized avatar
🙃
x
🙃
x

Block or report AdministratorGithub

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@abc123info
希潭实验室 abc123info
ABC_123,2008年入行网络安全,某部委网络安保工作优秀个人,某部委网络安全防护培训外聘讲师,某市局特聘网络安全专家,某高校外聘讲师,希潭实验室创始人。Struts2检测工具及Weblogic T3/IIOP反序列化工具原创作者,擅长红队攻防,APT技战法分析,代码审计,内网渗透。
@RicterZ
Ricter Zheng RicterZ
uid=1337(ricter) groups=1001(hacker),1002(acg),1003(security)

Independent Security Researcher

@VirtualAlllocEx
VirtualAllocEx VirtualAlllocEx
Founder RedOps | Red Team

RedOps GmbH

@aaaddress1
Sheng-Hao Ma aaaddress1
30cm.tw/me

TXOne Networks Inc. Taiwan

@hausec
Hausec hausec
script kiddie extraordinaire

@haus3c

@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(x(x_(x_x(O_o)x_x)_x)x)

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@1in9e
0h1in9e 1in9e
security engineer. whitehat. bugbounty hunter

Chengdu, China

@exp-sky
exp-sky exp-sky
Security Researcher, Pwn2Own 2017 Edge Browser Winner. Tianfu Cup 2018 and Tianfu Cup 2019 Edge Browser and Sandbox bypass Winner.
@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Security Researcher, Speaker, Microsoft MVP in Security

Podalirius Labs

@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@connormcgarr
Connor McGarr connormcgarr
OSCP, OSCE, OSEE | Exploit Development, Vulnerability Research, and Red Teaming.

@CrowdStrike United States of America

@XTeam-Wing
Wing XTeam-Wing
Marshal

Marshal SH

@Ramos-dev
Ramos Ramos-dev
Build a successful infrastructure.

Mount Carmel

@Abao520
Luo Qiang Abao520
A college student from China who likes singing, dancing, rapping, and basketball.HAHAHA
@ordaatest
aabbcc ordaatest
心向光明,无论身处多黑的夜,都不会沉沦

Team(This IS Me) China

@Alex0Young
Alex Alex0Young
baby Pwner | baby Security Researcher | Dubhe
@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@r0eXpeR
r0eXpeR r0eXpeR
"><scritp>alera(/'xs‘/)</scritp>

China,ShangHai

@r3nhat
r3n_hat r3nhat
Cyber Security Addicted. OAWSP, OASP, OSCE, OSCP, OSWP, eCPTX, eWPTX, CRTE, PACES, CARTP, CEH Certified.
@nbqofficial
Dario nbqofficial
Software developer | Reverse engineer Discord @ nbq#7049

Croatia

@ThunderJie
ThunderJie
Windows Kernel | Blackhat 2022 | MSRC 2022 Q3 TOP 100

China

@hacksysteam
HackSys Team hacksysteam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

HackSys Inc

@EddieIvan01
_ EddieIvan01

@Tencent \Device\KsecDD

@sbousseaden
sbousseaden
Threat Hunting & DFIR
@bats3c
batsec bats3c

@MDSecactivebreach UK

@TuuuNya
Tuuu Nya TuuuNya
一个想当黑客的艺术家 ✨

ʕ•̫͡•ʔ-̫͡-ʕ•͓͡•ʔ-̫͡-ʔ

@Lucifer1993
Lucifer1993
安全圈职业炮灰

Matrix China

@nice0e3
nice0e3 nice0e3
热爱技术

QAX-SGLab & Z-Team BeiJing