Skip to content

Users following 78ResearchLab

@H2aler
김재현(KIM JAEHYUN) H2aler
강점을 창조하는 개발자 · Creating Strength from Weakness · Transformer les faiblesses en forces

Seoul, South Korea

@hajunho
Juno hajunho
SAMSUNG ELEC., ETRI

Audrey Hepburn DEV Seoul, Korea

@stuxnet147
stuxnet147
replace the text to a seahorse emoji
@gbdngb12
김동건 gbdngb12
KVE-2024-0290 (Ark Library), CVE-2024-57970 (libarchive)

BoBpiler { Compiler Optimization Vulnerability Research } 서울 구로구 경인로 661 핀포인트타워 15층 1514호

@Yasha-ops
Yassine Damiri Yasha-ops

Ernst & Young - Cybersecurity Paris, France

@nimaarek
AliReza nimaarek
Just another Programmer

IR

@SpiralBL0CK
kn0 SpiralBL0CK
A simple beginner programmer.
@greek0x0
greekbust greek0x0
Reverse Engineer
@zmkeh
zmkeh

London, UK

@Jyny
Jerry Y. Chen Jyny
always starting new side projects, working at @jynychen

Taiwan

@Ghost-xiaonan
xiaonan Ghost-xiaonan
Either outstanding or out
@killvxk
killvxk
在你面前的是:大宗师,大德鲁伊,屠魔者,死亡领主,大领主,大法师,先知,大祭司,战争领主,虚空领主,狩猎大师,暗影之刃,奈非天,白狼,昆特牌的大师,猎魔人,守望先锋成员,单排吃鸡者。

USSR

@bopin2020
bopin bopin2020
Binary ~

Fairyland

@winterknife
winterknife winterknife
low-level developer with a focus on 𝙸𝚗𝚝𝚎𝚕 𝚡𝟾𝟼 ISA devices running 𝚆𝚒𝚗𝚍𝚘𝚠𝚜

Coruscant

@nonetype
Wonyoung Jung nonetype
Security researcher

Republic of Korea

@0neb1n
0neb1n 0neb1n
I wanner be the pwner.