Skip to content
View Dispa1r's full-sized avatar
😪
😪

Block or report Dispa1r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@hungslab
Henrybo hungslab
A student of Beijing University of Posts and Telecommunications

Beijing University of Posts and Telecommunications Beijing

@bata24
bata24 bata24
CTF Team: TokyoWesterns, katagaitai, cartagaitai

Japan

@zhenaguo
zhenaguo
Android reverse engineering | MTK & Qualcomm boot chain research | Preloader / LK / TrustZone
@xunchahaha
xuncha xunchahaha
14年 le 乙妹 #小女孩重度依赖 t 重度抑郁症和焦虑症休学 cn病症【芙蓉王源 尼古丁真梦女】拒一切同担同嫁同梦 推小女孩 短发t 厌蠢 内向 占有欲强 控制欲 疯子 恶趣味 抑郁症 焦虑症 双相情感障碍症 狂躁症 我玩第五人格那咋了 sorry我是女同 很内向出门只敢走下水道 嗑男同那咋了
@kasnria001
Lova Teks kasnria001
Focus on Mobile Security. Interested in Secure Boot Exploit.

US

@inclusionAI
inclusionAI inclusionAI
This organization contains the series of open-source projects from Ant Group with dedicated efforts to work towards Artificial General Intelligence (AGI).
@CC11001100
CC11001100 CC11001100
try to make yourself happy

BeiJing

@TKazer
Liv TKazer
QQ: 1319923129 Discord: tkazer, A reverse engineering enthusiast.
@zhuhuibeishadiao
猪会被杀掉 zhuhuibeishadiao
一入逆向深似海,从此孤单一个人。

WenZhou China

@stevemk14ebr
Stephen Eckels stevemk14ebr
I do security work and build things for fun.

0177.0x001:80

@romainthomas
Romain Thomas romainthomas
Security Engineer working on mobile, obfuscation and file formats • Creator of @lief-project / @open-obfuscator

@lief-project @open-obfuscator

@cafe3310
cafe3310 cafe3310
负责过支付,现在在 @AntLingAGI。X 上同名 id 被注册了,叫 @rh3cat 。有世界第一可爱三花猫啾啾。让 LLM 干活吧,人类多摸摸鱼。

@alipay @inclusionAI Hangzhou

@sledgeh4w
Sh4w sledgeh4w

Alibaba Hangzhou, China

@Ylarod
Ylarod Ylarod
Firefly is the cutest in the world !

Canada

@eunomia-bpf
eunomia-bpf eunomia-bpf
Unlock the potential of eBPF

United Kingdom

@gaasedelen
gaasedelen
turning over rocks and finding nothing is still progress.
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@dawnslab
Dawn Security Lab @ JD.com dawnslab
京东安全獬豸实验室 Dawn Security Lab
@who-is-xyy
just-xyy who-is-xyy
noob ctfer / can do few rev / NeSE
@0xbinder
0xbinder 0xbinder
Android Security Researcher
@fei3ei
feifei fei3ei
DeviceSecurity@alibaba

Hangzhou Dianzi University Hangzhou

@brant-ruan
Bonan Ruan brant-ruan
鸡声茅店月,人迹板桥霜

National University of Singapore Singapore

@LLeavesG
LLeaves LLeavesG

BUPT-Dubhe Team Beijing

@alibaba
Alibaba alibaba
Alibaba Open Source

Hangzhou, China

@FredericDT
FredericDT
Ph.D. Candidate at BUPT, Studying Cloud Security. You may refer me as fdt.

AS16-NOVEMBER-08

@muellerberndt
Bernhard Mueller muellerberndt
Uncertified hacker | P(G(F)) = ∀y q(y, G(F))
@cxxsheng
Sheng Cao cxxsheng
Android Security Researcher & PhD Candidate in HUST

Huazhong University of Science and Technology

@wrlu
小路 wrlu
Security Researcher

JD.com (@jd-opensource) Tianjin, China

@hxl13579
Xuliang Huang hxl13579
University of Illinois /major in computer engineering

University of Illinois Urbana Champaign Champaign

@binaryai
BinaryAI binaryai
The Neural Search Engine for Binaries
@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France