Skip to content
View Gr1mmie's full-sized avatar
🪐
Securing the Realms
🪐
Securing the Realms

Highlights

  • Pro

Organizations

@FortyNorthSecurity

Block or report Gr1mmie

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@DarkWebInformer
Dark Web Informer DarkWebInformer
A solo operation pulling threat intel from the dark web, deep web, and clearnet. Tracking breaches, ransomware, darknet markets, exploits, and emerging threats.
@redcode-labs
Red Code Labs redcode-labs
modern cyberwarfare instruments

Poland

@sneakerhax
sneakerhax
Red Team / Trendy Squid Life 🦑
@0xBugatti
Mohamed Nasr 0xBugatti
Cyber Security Specialist
@aaldebs99
Alex aaldebs99
Pentester by day, home data center maintainer by night
@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP

@SpecterOps France

@TheManticoreProject
The Manticore Project TheManticoreProject
Crowdsourced open source offensive and defensive security tools, to heighten the security posture of the community as a whole

France

@realoriginal
Austin Hudson realoriginal
Senior Researcher for Cobalt Strike.
@vexance
David G. vexance
Information Security

Security Consulting

@0xflux
flux 0xflux
Senior Security Research Engineer @elastic. Former Red Team engineer. Passionate about cyber defence, security research, and systems programming.

North West, England

@b33f00d
Raul b33f00d
RedTeamer

Space Dynamics Co. Earth

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@memN0ps
memN0ps
Rust | adversary tactics | windows internals | reverse engineering.

New Zealand

@xdp-project
XDP-project xdp-project
The eXpress Data Path (XDP) inside the Linux kernel
@Cryakl
Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.
@dreadnode
dreadnode dreadnode
AI Red Teaming | Research. Tooling. Evals. Cyber range.
@Zeyad-Azima
Zer0verflow Zeyad-Azima
Offensive Person, who is playing around the core of the 7 layers to build the 0Day Empire.

Malaysia

@snovvcrash
snovvcrash snovvcrash
Sr. Penetration Tester / Red Team Operator, author of the Pentester’s Promiscuous Notebook

(ノ°∀°)ノ⌒・*:.。. .。.:*・゜゚・*☆

@connormcgarr
Connor McGarr connormcgarr

United States of America

@0xHossam
Hossam Ehab 0xHossam
messing with computers below the abstraction layer ⚙️

@CyShield Egypt

@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@plackyhacker
John Tear plackyhacker
I am me... just an amateur malware developer. If you use my code, don't be naughty, keep it legal!!!
@infosecn1nja
Rahmat Nurfauzi infosecn1nja
Security Researcher/Red/Purple Teaming/Adversary Simulation/Threat Hunter. Contributors of Atomic Red Team, PS Empire, MITRE ATT&CK Framework, LOLBas, and more.

Jakarta, Indonesia

@sandflysecurity
Sandfly Security sandflysecurity
Sandfly Security provides agentless intrusion detection and incident response for Linux. Find hackers without loading any software on your Linux endpoints

Christchurch, New Zealand

@Offensive-Panda
Usman Sikander Offensive-Panda
An infosec guy who's constantly seeking for knowledge.

Cytomate solutions and services Qatar

@Sh3lldon
Sh3lldon Sh3lldon
Adversary Simulation & Malware Development | OSED | OSEP | CRTO | CRTE | CRTM certified

Kazakhstan

@KernelPanicOfficial
Kernel Panic KernelPanicOfficial
Kernel Panic Red Team

Greece

@nickvourd
Nikos Vourdas nickvourd
Just your friendly neighborhood APT:~# OSCE3 | OSCP | OSWP | CRTL | CRTO | OASP

Evil Corp Ltd. Chicago, IL, USA

@jstrosch
Josh Stroschein jstrosch
Reverse Engineer @ FLARE/Google. Content creator on YouTube/Pluralsight

M9 Cyber United States

@SaadAhla
SaadAhla SaadAhla
Security researcher, malware dev

Morocco

@guidedhacking
GuidedHacking guidedhacking
Reverse Engineering & Game Hacking Tutorials

United States of America

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@DemonDxv
DemonDxv
Anticheat developer, and cheat developer @ stitch.best / neonclient.com

New Mexico

@janoglezcampos
Yxel janoglezcampos
:P

Vigo, Galicia, Spain

@jonny-jhnson
Jonathan Johnson jonny-jhnson
Windows Internals Research and Telemetry Identification

USA