Skip to content
View ClownQq's full-sized avatar
🌴
假期中
🌴
假期中

Block or report ClownQq

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@repnz
Ori Damari repnz
windows kernel research & development

0x7c00

@0xcpu
panda bear 0xcpu
nothing interesting
@mirchr
Rich Mirch mirchr
Sysadmin turned Penetration Tester, Red Teamer, Security Researcher
@wanttobeno
Hugo Reuhl wanttobeno
Life is brief, and then you die, you know? So this is what we've chosen to do with our life. Steve Jobs
@LTears
LTears LTears
Simple but not simpler.

Abetsafe Security Lab Helsinki Finland

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@RiotVanguard

@saaramar
Saar Amar saaramar
Reversing, exploits, {Windows, Hyper-V, iOS} internals, mitigations.
@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
@utshina
Takahiro Shinagawa utshina
Professor of Computer Science at The University of Tokyo. His expertise is in Operating Systems, Virtualization, and Computer Security.

The University of Tokyo Japan

@Alex3434
Alexander Jeuk Alex3434
Computer Science student at TU Ilmenau

Ilmenau, Germany

@EricZimmerman
Eric EricZimmerman
I code stuff! However, this is time consuming! Please consider supporting my work via GitHub sponsors: https://github.com/sponsors/EricZimmerman

ZimTech4n6 Indianapolis

@changeofpace
changeofpace
Reverse engineering, windows internals, and hypervisors.
@Zero-Tang
Zero Tang Zero-Tang
MS student graduated from Columbia University. Researcher of VM, OS and computer architecture. Founder of Project NoirVisor.

GrimoireTech Limited Shanghai, China

@HoShiMin
Александр HoShiMin

OOO "SearchInform" Нижний Новгород, Россия

@ufrisk
Ulf Frisk ufrisk
IT-Security Minion

Sweden

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@bit4woo
bit4woo bit4woo
Creating with coding,Learning by doing,Learning by sharing!

shenzhen

@Fyyre
Fyyre Fyyre
Old school, expert reverse code engineer.
@Microwave89
Microwave89 Microwave89

Stealth Enhancements Providers LLC

@progmboy
progmboy
zhai zhai zhai
@agnosticlines
agnosticlines
reverse engineering, program analysis and exploit dev | i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects

[object Object] /dev/kmem

@bytecode77
Martin Fischer bytecode77
Software Developer & IT Security Expert

Germany

@JustasMasiulis
Justas Masiulis JustasMasiulis
Solving life problems with templates

San Francisco Bay Area

@vmcall
vmcall

@thesecretclub

@ycscaly
Yehonatan Cohen Scaly ycscaly
OS, Embedded and Vulnerability Researcher. CTO dWallet Labs Co-founder Odsy Network odsy.xyz OS Notebook: https://1drv.ms/u/s!AqiuStAQmFgxhWnzIysmySzjS

dWallet Labs

@SinaKarvandi
Sina Karvandi SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@Sqdwr
Sqdwr

118.964891,32.125421

@goldshtn
Sasha Goldshtein goldshtn
CTO of Sela Group, Microsoft Regional Director and C# MVP, international consultant and trainer.

SELA Group Kfar Saba, Israel

@hanickadot
Hana Dusíková hanickadot
Staff Software Engineer in Woven by Toyota, Chair of Study Group for Reflection & Co-Chair of Evolution Working Group in C++ committee

Woven by Toyota Brno, Czech Republic

@BradenCalderMurphy
Braden Murphy BradenCalderMurphy

Symmetric Technology Software South Africa

@r00tk1ts
r00tk1t r00tk1ts
Binary Security Enthusiast | Primary Programmer

幻想乡

@lich4
lich4 lich4
安全工程师,逆向分析爱好者,前端后台移动端桌面全栈 | 个人QQ 571652571 | 原创技术博客 https://lich4.github.io | 技术交流群 560017652

Baidu.Inc China Shanxi XIAN

@DDoSolitary
DDoSolitary DDoSolitary
DDoSolitary [at] gmail [dot] com