Armadin
armadin-public
Armadin Inc and the author is not responsible or liable for any code hosted here or its use cases.
ezcorp.org
ezcorp-org
Privacy-first tools that actually work. Free, secure, and stupidly simple.
charB66
charB66
Purple Teamer passionate about CTI, adversary emulation, and malware development.
Weaponized VSCode
WeaponizedVSCode
Weaponized VSCode, Make vscode like an offensive security tool to help the hackers, just like a development IDE to developers.
Ireland
OrcaCyberWeapons
OrcaCyberWeapons
The OrcaCyberWeapons community is a focused space for reverse engineers, exploit developers & lowlevel sec, We specialize in Windows & iOS vuln research.
HyperDbg
HyperDbg
Hardware & Software Debugging, Analyzing, and Reverse Engineering Infrastructures
Chuong Dong
cdong1012
MSTIC Senior RE @ Microsoft. Former FLARE RE @ Mandiant. I do malware stuff.
Microsoft
Edo Maland
screetsec
ᴏꜰꜰᴇɴꜱɪᴠᴇ ꜱᴇᴄᴜʀɪᴛʏ ᴄᴏɴꜱᴜʟᴛᴀɴᴛ | ᴏꜱᴄᴇ³ | ᴏꜱᴇᴘ | ᴏꜱᴡᴇ | ᴏꜱᴇᴅ | ᴏꜱᴄᴘ | ᴏꜱwᴘ | ᴏꜱwᴇ | ᴄʀᴛᴘ | ᴄʀᴛᴇ | ᴄʀᴛᴏ | ᴇᴡᴘᴛxᴠ2 | ᴇᴄᴛᴘxᴠ2 - ᴡᴀɴɴᴀʙᴇ ʀᴇᴅ ᴛᴇᴀᴍᴇʀ
cts
stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue.
Previously @Vector35, @sslab-gatech.
@Zellic 0x4141414141414141
Kuba Gretzky
kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
x86byte
x86byte
iOS & Windows Vulnerability Researcher & Exploit Developer — Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend 👾🥤
securekernel.exe
Sam Bent
DoingFedTime
Defcon speaker, podcaster, hacker, author, exDarknet Vendor and Darknet Admin, youtuber, blogger
DoingFedTime Vermont
The Raven File
TheRavenFile
Official Git Repo of THE RAVEN FILE. Here, you can find useful IOCs observed during my Cyber Investigations.
Internet
PreviousNext