Skip to content
View S3cur3Th1sSh1t's full-sized avatar

Sponsors

@anivar
@DavidProbinsky
Private Sponsor
@WHITE-ROOK-Cyber
Private Sponsor
Private Sponsor
@hvs-consulting
@DarknightCanada
@fashionproof
Private Sponsor
@4rchiba
Private Sponsor
@sl4cky

Sponsoring

@skelsec
@Kudaes

Highlights

  • Pro

Block or report S3cur3Th1sSh1t

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@filipebcs
Filipe da Silveira filipebcs
Electrical Engineer with a Master’s degree in Digital Signal Processing and a strong background in cybersecurity and digital forensics. Experienced in pentestin

Sicoob Brasília - Brazil

@grizzlymack
Sean McKee grizzlymack
Hacker/Security Researcher

Black Hex Security

@hex-3030
HEX hex-3030
𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐞𝐫 / 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐞𝐫 / 𝐎𝐒𝐈𝐍𝐓 𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭 / 𝐂𝐲𝐛𝐞𝐫𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 / #Infosec #RedTeam 𓃬
@kfallahi
kfallahi

@ravro-ir

@rene-speulda
Muecke_ rene-speulda
💻 IT-Nerd wird Cyber-Pro. 🧠 Long-Covid, Depression & dennoch mehr Updates als Windows! ⚓ Trotz Bugs – mein Herz bleibt auf ihrer Frequenz. #always

Cuxhaven

@SaintArthur
Arthur Brilhante SaintArthur
An open-source software and malware enthusiast. i like to break stuff :)

SECTI brazil

@TalEliyahu
Tal Eliyahu TalEliyahu
Passion for solving problems, developing new solutions, innovation and experimentation

Singapore

@0xRoam
0xRoam 0xRoam

where ever i may

@f1lby
F1lby f1lby
Cybersecurity. Offensive & Defensive. Ciso. Author.

Cymru

@MrRockettt
Salmon Kumar MrRockettt
Cybersecurity Engineer | Application Security | Bug Hunter

Tirunelveli, Tamil Nadu, India.

@DustNerd
DustNerd DustNerd
The breadth of knowledge determines the width of the attack's surface. The depth of knowledge determines the severity of the attack's impact.

Cyber Security Internet World

@emilycodestar
Emily 💞 emilycodestar
✨ hiiii! check out my open-source projects 💻💖 they’re like my little babies and I love sharing them 🌸🐾
@yzendour
yzendour
you can't fake passion

France

@sup3rshy
suachuakhduong sup3rshy
The biggest risk is often not taking any risk at all.
@Liquid-Syn
Liquid-Syn

South of the River Styx.

@AnshumanSrivastavaGIT-2025
Anshuman Srivastava AnshumanSrivastavaGIT-2025
Networking + Cyber Security - Firewalls + Ethical Hacking & Penetration Testing Enthusiast
@ScriptJ3st3r
ScriptJester ScriptJ3st3r
A developer interested in some deep understanding of software by either breaking of dismantling

Kumasi, Ghana

@w0rm53r
Travis Fritz w0rm53r

Northern Virginia

@chenpython
Chen chenpython
what?

ChongQing