Skip to content
View M507's full-sized avatar
Testing..
Testing..

Organizations

@RITRedteam @ritsec @BlueArmors

Block or report M507

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@x86byte
x86byte x86byte
iOS & Windows Vulnerability Researcher & Exploit Developer — Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend 👾🥤

securekernel.exe

@apkunpacker
ApkUnpacker apkunpacker
Android ɹǝǝuıƃuǝ ǝsɹǝʌǝᴚ, Android/iOS Dynamic and static analysis, Radare2, Frida, Vulnerability Research, RASP Bypass.

127.0.0.1

@niemand-sec
Joel Noguera niemand-sec
Twitter: @niemand_sec
@0d4rujd
djurado 0d4rujd
Ethical Hacker, Red Teamer and Bug Hunter
@moyix
Brendan Dolan-Gavitt moyix
Assistant Professor in CSE at NYU Tandon School of Engineering, focusing on security, program analysis, and reverse engineering.

New York, NY

@mrbbot
MrBBot mrbbot

MrBBot United Kingdom

@bazad
Brandon Azad bazad
iOS security research

Google Project Zero

@waryas
TALON SCHMELER waryas
Senior Security Researcher. Made FastPokeMap (top100 alexa in nov 2016) & HorribleSubs as pet projects.

Santa Fe College

@li-ch
Li Chen 陈 力 li-ch
Finished beats perfect.

ZGC Lab Beijing

@einfallstoll
Fabio Poloni einfallstoll

Compass Security Schweiz AG Switzerland

@emanuelduss
Emanuel Duss emanuelduss

@CompassSecurity Switzerland

@weslambert
weslambert
Lead Engineer, NSM at Target

Security Onion Solutions LLC Augusta, GA

@vm32
Abdullah vm32
Everything is Open Source if You Can Reverse Engineer it

Saudi Arabia

@mgreen27
Matthew Green mgreen27
DFIR / Detection guy

Sydney

@nickvourd
Nikos Vourdas nickvourd
Just your friendly neighborhood APT:~# OSCE3 | OSCP | OSWP | CRTL | CRTO | OASP

Evil Corp Ltd. Chicago, IL, USA

@ZeroMemoryEx
Mairon ZeroMemoryEx
Cyber Security Consultant | Security Researcher
@D4Vinci
Karim shoair D4Vinci
A high&low-level coder and a lot of things in between. An extremely curious creature who loves to learn. Break things or make things that break things.

Egypt

@akemin-dayo
Karen/あけみ akemin-dayo
Some kind of pineapple girl or something.

どこでもない

@watchtowrlabs
watchTowr Labs watchtowrlabs
Labs division of watchTowr
@edoardottt
Edoardo Ottavianelli edoardottt
Offensive Security Analyst and Researcher

Italy

@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@iBotPeaches
Connor Tumbleson iBotPeaches
Director of Engineering @sourcetoad

@sourcetoad Tampa

@actuator
actuator
“Control yourself, not your dreams.” - Dr. Stephen LaBerge
@y1nglamore
颖奇L'Amore y1nglamore
Security Researcher from Alibaba Cloud. CCIE#52XXX. Blog: www.gem-love.com

Alibaba Cloud Beijing

@f
Fatih Kadir Akın f
Building prompts.chat — JavaScript Developer. Ruby Lover. Author. — @github Star.

@Teknasyon Istanbul, Turkey

@mpgn
mpgn
̿ ̿̿'̿'\̵͇̿̿\=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿

France

@geohot
George Hotz geohot
We will commoditize the petaflop.

@commaai @tinygrad San Diego, CA

@WKL-Sec
White Knight Labs WKL-Sec

White Knight Labs USA

@ClaraCrazy
Clara K ClaraCrazy
Fall free to the realm of the dead. Let them assume the end while you plan your next strike, and shock everyone with your return once you are ready to dominate!

CrazyCo In the Cloud

@ginsudev
Ginsu ginsudev
iOS Developer

Australia

@0xf4n9x
_0xf4n9x_ 0xf4n9x
CyberSec Enthusiast, Security Researcher, RedTeam, Security Automation, ❣️OpenSource
@cldrn
Paulino Calderon cldrn
Network/Application security specialist | Open Source contributor | @nmap NSE developer | websec.mx & websec.ca | @pwnlabmx

Websec Mexico city

@nccgroup
NCC Group Plc nccgroup
Please report all security issues to security at nccgroup dot com

Global

@NSEcho
NSEcho

@rpath/.

@therealdreg
Dreg therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher

rootkit.es Spain

@xl7dev
xl7dev
information sec
@woachk
woachk
Kernel/hypervisor engineer, Amazon EC2.

@aws, @checkra1n Berlin, Germany