Skip to content
View AV1080p's full-sized avatar
:octocat:
Security
:octocat:
Security

Organizations

@PolarisLab

Block or report AV1080p

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@RedLectroid
ShellStorm RedLectroid
Computer security enthusiast and martial artist. I like to find holes in defenses and exploit them.
@0xthirteen
Steven F 0xthirteen
Offensive Security Engineer at SpecterOps

SpecterOps

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@dev-2null
dev2null dev-2null
Penetration Tester | OSCP | OSCE | OSEP | AD Security Enthusiast | Allowed To Act On Behalf Of Other Identity

Forest

@3gstudent
3gstudent
good in study,attitude and health.
@padovah4ck
chris padovah4ck
AppSec / Programming / SANS [GIAC GSSP-.NET]

Padua - Italy || c:\users\chris

@jnqpblc
John Cartrett jnqpblc
jnqpblc on BloodHound Slack, and Google Mail

@ndaysecurity

@NtRaiseHardError
dtm NtRaiseHardError
Self-taught Windows wannabe reverse engineer

@0x00sec Someone's basement

@mhaskar
Askar mhaskar
I write codes that break codes, Hacker wannabe.

Between Lines

@woj-ciech
Wojciech woj-ciech
https://www.offensiveosint.io/

Offensive OSINT

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@EgeBalci
Ege Balcı EgeBalci
Security Researcher

PRODAFT Den Haag, Netherlands

@n00py
n00py n00py
I look at packets.

@trustedsec Denver

@Green-m
Green-m Green-m
AV Evasion,Pentest, Metasploiter Keybase: https://keybase.io/green_m
@sparcflow
Sparc Flow sparcflow
Author of Hack The Planet series: https://www.sparcflow.com/best-hacking-books/

Hack Like a Pornstar

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My learning platform links: https://truecyber.world https://mr.un1k0d3r.world

TrueCyber Inc.

@Tr3jer
CongRong. Tr3jer
ever tried. ever failed. try again. fail again. fail better.

@antgroup

@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator
@cobbr
Ryan Cobb cobbr

SpecterOps Dallas, TX

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@BorjaMerino
Borja Merino BorjaMerino

@BorjaMerino Spain (León)

@ThunderGunExpress
TGE ThunderGunExpress
https://twitter.com/cpl3h
@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@samratashok
Nikhil "SamratAshok" Mittal samratashok
Founder of Altered Security, Hacker, InfoSec Professional, PowerShell and AD pwner, Creator of Kautilya and Nishang :)

Altered Security

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@danielbohannon
Daniel Bohannon danielbohannon
Principal Applied Security Researcher (prev IR Consultant)

Mandiant Washington, D.C.

@Ivan1ee
Ivan Lee Ivan1ee
Security Researcher,Pentester
@homjxi0e
Harr0ey homjxi0e
Red Teamer | Security researcher
@nullbind
Scott Sutherland nullbind
Twitter: @_nullbind http://www.netspi.com/blog/author/ssutherland/ http://www.slideshare.net/nullbind

@NetSPI