Tas9er
Has never participated in any cybersecurity operations of any country or region, and will not do so in the future either / 從未參與任何國家或者地區的任何網絡安全技術行動,以後也是如此
JSREI(JavaScript Reverse Engineering Infrastructure)
JSREI
提供更多更好的JS逆向工具,让JS逆向变得简单。 招聘维护人员和开发人员,有兴趣请发邮件给我
China
Bobby Cooke
boku7
Adversary Simulation @ IBM X-Force Red
IBM X-Force Red Adversary Simulation United States
希潭实验室
abc123info
ABC_123,2008年入行网络安全,某部委网络安保工作优秀个人,某部委网络安全防护培训外聘讲师,某市局特聘网络安全专家,某高校外聘讲师,希潭实验室创始人。Struts2检测工具及Weblogic T3/IIOP反序列化工具原创作者,擅长安全咨询、红队攻防、APT技战法分析、代码审计、内网渗透。
御守实验室
Amulab
中安网星御守实验室(Amulab)是隶属于中安网星的纯技术研究团队。主要职能包括横向移动研究、AD域安全研究、Windows安全研究等前瞻攻防技术预研、工具孵化,为产品输出安全能力。
China
ProjectDiscovery
projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
Andreas Nilsen
adde88
I make devies more secure and less secure, depending on the hat • OpenWRT dev • WiFi Pineapple • RE • Assembly • Now teaching machines to think.
@adde88 - Security - Research - Consultant, Dev. Reverse Engineering, Debugging Norway
StricklandF
StricklandF
Learner & Collector of Reverse Engineering, Network Proxy, and Essential Utilities.
Amsterdam, The Netherlands
小弟调调
jaywcjlove
Hi, I'm Kenny, Fullstack developer from Suzhou, China.
ʕ•̫͡•ʔ-̫͡-ʕ•͓͡•ʔ-̫͡-ʔ Suzhou, China
PreviousNext