Skip to content
View sanidope's full-sized avatar

Block or report sanidope

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@six2dez
six2dez six2dez
Ethical hacker, bash lover, foss rulz!

Spain

@fs0c131y
Baptiste Robert fs0c131y
🇫🇷 Good Faith Hacker. Fight disinformation at @predictalab. #OSINT for good.

Predicta Lab

@AzAgarampur
Arush Agarampur AzAgarampur
I enjoy Windows internals, low-level development, reverse engineering, and offensive security

California

@oleavr
Ole André Vadla Ravnås oleavr

@nowsecure Stavanger, Norway

@mohemiv
Arseniy Sharoglazov mohemiv
Penetration Tester

My personal account

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@homjxi0e
Harr0ey homjxi0e
Red Teamer | Security researcher
@zcutlip
Zachary Cutlip zcutlip
Offensive security researcher. I like breaking things. Even more, I like making tools to help people break things.

Oakland, CA

@jduck
Joshua J. Drake jduck
Securing the future through modern technology.

Founder and Software Security Specialist at Magnetite Security Austin, TX

@Crypt0s
Bryan "Crypt0s" Halfpap Crypt0s
Offensive Security @ CoreWeave.com I do Radios, Protocols, Python, and Pentesting. One time I tried to make a drone hacking product

CoreWeave.com MD, USA

@bigb0sss
bigb0ss bigb0sss
OSWE | OSCE | OSCP | Lead Offensive Security Engineer - Pentesting, RedTeam, ExpDev, Application Security

\x90\x90

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@ItsIgnacioPortal
Ignacio J. Perez Portal ItsIgnacioPortal
Cybersecurity Professional in the making. English | Spanish

Jujuy, Argentina

@samyk
samy kamkar samyk
explo(r|it)ing boundaries

openpath security los angeles

@r00t-3xp10it
pedro ubuntu r00t-3xp10it
"Be a hacker not a criminal"... Pentester | IT enthusiastic | blogger

@Suspicious-Shell-Activity Lisbon - portugal

@matrosov
Alex Matrosov matrosov
IDAholic, #CodeXplorer, @REhints , "Rootkits and Bootkits" book co-author (http://bootkits.io), Firmware voodoo, and TEE exorcist.

BINARLY Los Angeles CA

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@swagkarna
swagkarna swagkarna
Hacking is like sex, you need breath, in the last step, you feel incredible pleasure and the best time to practice it is at night

127.0.0.1

@trickster0
trickster0 trickster0
Snr Red Teamer & Malware Dev, Reverse engineering for fun and analyzing Winternals

Greece

@plackyhacker
John Tear plackyhacker
I am me... just an amateur malware developer. If you use my code, don't be naughty, keep it legal!!!
@Zenixas
zenix Zenixas
I like reverse engineering
@rhotav
Utku Çorbacı rhotav
Security Researcher
@arsium
ថಘઅഞפּ ṛཥચ arsium
После нас - тишина.

Away.

@jynik
Jon Szymaniak jynik
Security, embedded systems, and punk rock
@cdong1012
Chuong Dong cdong1012
Reverse Engineer @ Google Cloud/Mandiant. BSCS Georgia Tech. I do malware stuff.

Google Atlanta, GA

@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@dhondta
Alex dhondta
I'm a security professional with a passion for cybersecurity and programming (especially Python).
@maekawatoshiki
uint256_t maekawatoshiki
C++ / Rust / Graduate student

Japan

@stewdio
Stewart Smith stewdio
Hi, I’m Stewart Smith—a creative polymath in Brooklyn NY. I’m excited about spatial computing, quantum computing, and more.

@Moar-Tech Brooklyn NY

@Coldzer0
Coldzer0 Coldzer0
Malware 🕶 Offensive Developer 😎 Reverse Engineer 🐉
@sailay1996
valen sailay1996
hackthebox.eu/profile/1467

Myanmar

@jhalon
Jack Halon jhalon
Red Team and Offensive R&D

US

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@jeannekamikaze
Jeanne-Kamikaze jeannekamikaze
Haskeller, computer graphics enthusiast.
@lawrenceamer
Lawrence Amer lawrenceamer
Hacker with attitude , Father of #0xsp

HongKong

@BG7YWL
BG7YWL BG7YWL
Maker, electronics hobbyist and enthusiast, IoT Security Researcher.

Changsha, China

@saulpanders
saulpanders
Math & cryptography enthusiast. Security is my jam.
@pwn1sher
Sudheer Varma pwn1sher
OffSec Enthusiast , Think Evil Do Good

tun0