Skip to content
View Reijaff's full-sized avatar

Block or report Reijaff

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@firmianay
一蓑烟雨 firmianay
Security researcher & CTF Player & member of @XDSEC, @xdlinux, @LCTF, @Vu1nT0tal

Xidian University China

@crisprss
Crispr crisprss
CTFer@Dubhe, Bachelor's degree in BUPT, Ph.D student in Fudan University. Speaker PoC2025, BlackHat USA 2025, Speaker re//verse2026

FDU

@MaorSabag
Maor Sabag MaorSabag
A Red Teamer and Security Researcher, Loves Malware Development, Ethical Hacking and CTFs :D
@agnosticlines
agnosticlines
reverse engineering, program analysis and exploit dev | i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects

[object Object] /dev/kmem

@SisselCBP
Sissel SisselCBP
ctfer@天枢Dubhe
@KelvinMsft
Kelvin KelvinMsft
@microsoft Windows Kernel Engineer

Microsoft Redmond, WA

@kagurazakasanae
神楽坂早苗 kagurazakasanae
we had everything before us,we had nothing before us

localhost

@waldo-irc
waldo-irc
Just a guy made of green pixels.
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@Escapingbug
Anciety Escapingbug
My profile picture explains everything. Cheerleader of @Team-Eur3kA & @r3kapig. Toy Generator

北京某211大学 Azeroth

@nelfo
nelfo
C++ Developer, Reverse-Engineer

Ukraine

@h1pmnh
@pmnh h1pmnh
Hacking on Synack, HackerOne and Bugcrowd as pmnh - posting interesting tools in this repo, please comment/share/contribute!
@yuligesec
yuligesec yuligesec
Security Researcher/CTFer/APISecurity Community Founder.

Beijing,China

@deepinstinct
Deep Instinct deepinstinct
Deep Instinct's Research Team
@za233
R1mao za233
r1mao17323@gmail.com
@Z3ratu1
Z3ratu1 Z3ratu1
想当大黑阔
@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@mathisvickie
Segy mathisvickie
I am interested in Windows reverse engineering, security research, hacking (including games) and exploit development.
@changeofpace
changeofpace
Reverse engineering, windows internals, and hypervisors.
@mo-xiaoxi
moxiaoxi mo-xiaoxi
CEO & Founder @Clouditera | CTF Player of Tea-Deliverers, Blue-Lotus.

Tsinghua University China

@iSafeBlue
浅蓝 iSafeBlue
浅蓝 b1u3r , Security Researcher , Java Development Engineer
@syksec
Shelton syksec

The Hong Kong Polytechnic University

@ChrisTruncer
ChrisTruncer ChrisTruncer
A red teamer and tool developer
@TheKingOfDuck
鸭王 TheKingOfDuck
Infosec Researcher | Coder | Social Observer | Shitologist|Go|Python|Java|JS

Shitologist

@AzAgarampur
Arush Agarampur AzAgarampur
I enjoy Windows internals, low-level development, reverse engineering, and offensive security

California

@brosck
Brosck brosck
「🎩」Just a Cybersec Guy 「♦️」Red Team 「🇧🇷」Brazil 「⚡」20 y/o 「👾」CTF Player 「🤖」Developer 「❤️」Maldev & RTO
@evilashz
evilash evilashz
Offensive Security Research
@wofeiwo
GaRY wofeiwo
Happy beginning is always good. Wish the ending is satisfied too.

@Alipay China

@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@lele8
lele lele8
若用本人项目去进行:HW演练/红蓝对抗/APT/黑产/恶意行为/违法行为/割韭菜等行为,本人概不负责,也与本人无关
@GhostPack
GhostPack GhostPack
A collection of security related toolsets.
@seventeenman
Su ShengLu seventeenman
RedTeamer | CTFer

lab null

@CaledoniaProject
CaledoniaProject
I build secure systems, break things to understand them, and learn every day.