Skip to content
View L4ys's full-sized avatar
😴
Lazy
😴
Lazy

Organizations

@TrapaSecurity

Block or report L4ys

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@HexRaysSA
Hex-Rays SA HexRaysSA
Hex-Rays - State of the art binary code analysis tools
@williballenthin
Willi Ballenthin williballenthin
/usr/bin/nethack

@HexRaysSA

@doitaljosh
Josh Currier doitaljosh
I do all the reverse engineering legwork so you don't have to.

Tampa, Florida, United States

@jhftss
Mickey Jin jhftss
Exploring the world with my sword of debugger :)

Independent Researcher

@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@ergrelet
Erwan Grelet ergrelet
Fond of reverse engineering and software development. Doing security engineering at some company.

Montreal, QC

@david942j
david942j david942j
david942j @ 217

Google Taiwan

@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@jonaslyk
jonaslyk
<a onload="alert(1);">x</a>

file://con

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@sailay1996
valen sailay1996
Just an idiot, a tiny presence in an infinite universe. S-1-5-7

Myanmar

@leesh3288
Seunghyun Lee leesh3288
Xion

Carnegie Mellon University Pittsburgh, PA

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@math1as
mathias math1as
Security Researcher
@maxpl0it
maxpl0it maxpl0it
Security researcher focusing on browsers and routers

London, England

@winmin
swing winmin
Focus on Vulnerability Discovering and as CTF Player @FlappyPig @r3kapig

Beijing,China

@aesophor
ᴀᴇꜱᴏᴘʜᴏʀ aesophor
Debugging complex filesystem bullshit at Synology

Synology

@killvxk
killvxk
在你面前的是:大宗师,大德鲁伊,屠魔者,死亡领主,大领主,大法师,先知,大祭司,战争领主,虚空领主,狩猎大师,暗影之刃,奈非天,白狼,昆特牌的大师,猎魔人,守望先锋成员,单排吃鸡者。

USSR

@james0x40
james0x40 Suspended
Windows kernel & browser security researcher
@sweetchipsw
sweetchip sweetchipsw
Former Security Vulnerability Researcher, Graduated from Sejong University

Sejong University Seoul, Korea Republic of

@riusksk
泉哥 riusksk
《漏洞战争》作者,公众号:漏洞战争

VulWar China

@zhuhuibeishadiao
猪会被杀掉 zhuhuibeishadiao
一入逆向深似海,从此孤单一个人。

WenZhou China

@progmboy
progmboy
zhai zhai zhai
@KelvinMsft
Kelvin KelvinMsft
@microsoft Windows Kernel Engineer

Microsoft Redmond, WA

@ionescu007
Alex Ionescu ionescu007
CTIO at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.windows-internals.com

Winsider Seminars & Solutions Inc.

@exodusintel
Exodus Intelligence exodusintel

Exodus Intelligence Austin, TX