It's not a competition, but I'm winning.
Y11
XiaomingX
Software Dev @ X | Linux, Java, Spring, Python, Golang, Next.js | Open Source Enthusiast | LLM Innovator | M.Sc. in Software Engineering 🚀
Jobleap.cn Japan
Andrew Michael Collins
TensorDev215
I love working on new challenges. If you need help with any tasks, I’d be happy to connect.
Nationwide Marketing Group TX, United State
be ah ou
Oussama0011cyber
Network Engineer | Network Security | Network Administration | Network Support Technician | NOC Technician | Systems Administrator | IT Support | Help Desk
ORAN
KL3FT3Z
toxy4ny
✔ Complex Red Team / Adversarial Simulation operations.
✔ Penetration testing (web, infra, social engineering).
✔ Imitation of APT. Lead of @Hackteam-Red
Hackteam.Red
Triet Trinh
trinhminhtriet
✅ Platform Engineer | AWS Certified | Scrum Master PSMI | Java | Golang | Rust | Android | Remote
🤖 Vietnam
Milon
Milon-247
🚀 Penetration Testing Specialist | 🧠 Ethical Hacker | 🔐 WordPress Security Expert
I’m passionate about securing digital assets and helping businesses
bangladesh
Danny Mateo Hernández
dannymateo
I am a Danny programmer passionate about code, as a hobby and as a job, software is for me.
Igor Holt
igor-holt
Principal Investigator, Kovach Enterprises | Building Genesis Conductor — Quantum-Hybrid Thermodynamic AI Orchestration
Genesis Conductor Maryland
David Dennison
davidldennison
🎯SEO Mastermind | Content Marketing Wiz | Noob Developer🚀Combining SEO expertise, dev tools, and innovation to thrive at the crossroads of marketing and tech!
@w3c @Search-Riot-Marketing-Agency-for-Devs Las Vegas, NV
Javier Garzón
javiertecteos
Tecnólogo en mecatrónica. Licenciado en Diseño Tecnológico. Magister en educación. Con intereses en educación, teología, tecnologías emergentes y diseño
Maina Brian
Maina-code
Software and web developer, Pentester, devOPS, cloud architecture, AI agents and cyber security.
NexBridge Solutions Nairobi, Kenya
BURAK BALTA
burakcanbalta
I engineer custom red team utilities focused on wireless intrusion, exploit development, privilege escalation, phishing infrastructure, and covert access deploy
PreviousNext