Skip to content
View niaojin's full-sized avatar

Block or report niaojin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@lkarlslund
Lars Karlslund lkarlslund
Curious Security Minded Octopus, freelance security consultant, loves Active Directory, finding holes in the cheese, coding Golang, ntlm.pw

NetSection Security Denmark

@0xflux
flux 0xflux
Senior Security Research Engineer @elastic. Former Red Team engineer. Passionate about cyber defence, security research, and systems programming.

North West, England

@Cloud-Architekt
Thomas Naunheim Cloud-Architekt
Cloud Security Architect, Microsoft MVP

Koblenz

@klezVirus
klezVirus
Lucky husband, proud father, and security researcher

SpecterOps

@waryas
TALON SCHMELER waryas
Senior Security Researcher. Made FastPokeMap (top100 alexa in nov 2016) & HorribleSubs as pet projects.

Santa Fe College

@SinaKarvandi
Sina Karvandi SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@ReversecLabs
Reversec Labs ReversecLabs
Research and development output from Reversec's consultants

Sweden

@wecooperate
wecooperate
拒绝内卷、合作共赢 | wecooperate、wewin
@SpecterOps
SpecterOps SpecterOps

United States of America

@hzqst
hzqst hzqst
Game Security & Game Engine & Realtime Rendering

Jiangsu, China

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@evilashz
evilash evilashz
Offensive Security Research
@mvelazc0
mvelazco mvelazc0
Mauricio Velazco - Purple Team || Noob
@joeavanzato
panscan joeavanzato
Security Spaghetti, al dente. DFIR, Detection Engineering, Threat Hunting, etc. Join my Discord for Tool Discussion: https://discord.gg/kEQy82N3uT
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@jonny-jhnson
Jonathan Johnson jonny-jhnson
Windows Internals Research and Telemetry Identification

USA

@uknowsec
Uknow uknowsec
不忘初心,方得始终

Shanghai

@SEKOIA-IO
Sekoia.io SEKOIA-IO
Cybersecurity at a New Pace
@tijme
Tijme Gommers tijme
Adversary Simulation - TIBER - ART - Red Teaming

@ABNAMRO The Netherlands

@TianNaYa
TianTianYa TianNaYa
hahahahahahaha

null null

@M0nster3
M0nster3 M0nster3
Junior Security Researcher

China

@chenjj
Jianjun Chen chenjj
I do security research and make security tools.

CA, USA

@huoji120
Huoji's huoji120
Information Security Research & Development

rongma.com 北京 朝阳

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | co-founder of maldevacademy.com