Skip to content
View Bad-Jubies's full-sized avatar
🙃
🙃

Block or report Bad-Jubies

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@eversinc33
eversinc33 eversinc33

Check Point Research Vienna

@ioncodes
Layle ioncodes
part time stack frame counterfeiter

0x41414141

@nu1lptr0
Abhishek Kumar Singh nu1lptr0
OnlyWindows

Qualcomm Bangalore,India

@garrettfoster13
unsigned_sh0rt garrettfoster13
Security Researcher at @SpecterOps

SpecterOps

@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@Archie-osu
Archie_UwU Archie-osu
i dont know how computers work

Discord: archie_uwu Czech Republic

@R1perXNX
R1perXNX R1perXNX
I write insecure code

Italy

@susMdT
Dylan Tran susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman Ex-CPTC & Ex-CCDC @cpp-cyber

home Building 98C, 4-23: Telco Lab @ CPP

@T3nb3w
T3nb3w T3nb3w
Learner :)

UK

@andrewrk
Andrew Kelley andrewrk
Lead developer & president of Zig Software Foundation

@ziglang Portland, Oregon

@allyourcodebase
All Your Codebase allyourcodebase
...are belong to Ziguanas, but we'd also be delighted to give them back!
@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@gsmith257-cyber
S1n1st3r gsmith257-cyber
Red Team Lead

@PhantomSecurityGroup

@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@Wh04m1001
Filip Dragović Wh04m1001
OSCP,OSEP,CRTO,CRTP,CRTE,PACES
@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@ConnorBP
Connor "segfault" Postma ConnorBP
HI THERE! My favourite return type is `std::result::Result<(), Box<dyn std::error::Error>>`
@Cracked5pider
5pider Cracked5pider
Software Dev @ InfinityCurve Labs

@InfinityCurveLabs

@0xDeku
Alon Leviev 0xDeku
Security Researcher
@gtworek
Grzegorz Tworek gtworek
https://linkedin.com/in/grzegorztworek
@connormcgarr
Connor McGarr connormcgarr

United States of America

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@Leo4j
Rob Leo4j
Active Directory, Red Teaming, and Network Security
@Ben-Lichtman
B3NNY Ben-Lichtman
Hacker, Programmer, Engineer. Security @ MS

Microsoft

@sfewer-r7
Stephen Fewer sfewer-r7
Senior Principal Security Researcher at Rapid7

@rapid7 Ireland

@BlackSnufkin
BlackSnufkin BlackSnufkin
Red-Teamer & Malware Dev | CRTL
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@koutto
Koutto koutto
Jérémy Brun-Nouvion | Hacker, France

Paris