Skip to content
View bikashdash's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report bikashdash

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@0xJs
0xJs 0xJs
Jony Schats

@HackDefenseNL

@ZeroMemoryEx
Anas ZeroMemoryEx
Cyber Security Consultant | Security Researcher
@VirtualAlllocEx
VirtualAllocEx VirtualAlllocEx
Founder RedOps | Red Team

RedOps GmbH

@Cracked5pider
5pider Cracked5pider
Software Dev @ InfinityCurve Labs

@InfinityCurveLabs

@ryantxu1
Ryan Xu ryantxu1
Cybersecurity Engineer at MITRE

MITRE Corp

@FiYHer
华仔 FiYHer
Hi

Technology Company ShenZhen

@NextronSystems
Nextron Systems GmbH NextronSystems
We Detect Hackers

Frankfurt, Germany

@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@wavestone-cdt
Wavestone - Cybersecurity & Digital Trust wavestone-cdt
Projects from the auditors and consultants from Wavestone's Cybersecurity & Digital Trust practice

Wavestone

@xct
xct xct
Hobby ⚑ Collector

Hack The Box Yokohama

@rip1s
nonick rip1s
<script>alert('Hello world')</script>

C:\Windows\

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@exploitblizzard
Exploit Blizzard exploitblizzard
-<-

-62.937955, -60.556043

@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@konatabrk
konata konatabrk
Vulnerability Researcher

In the wires

@plackyhacker
John Tear plackyhacker
I am me... just an amateur malware developer. If you use my code, don't be naughty, keep it legal!!!
@markyason
Mark Vincent Yason markyason
Software Reverse Engineer and Vulnerability Researcher | Independent Security Researcher | markyason.github.io
@BehroozAbbassi
Behrooz Abbassi BehroozAbbassi
Windows System Programming, Vulnerability Research, Reverse Engineering, Windows Internals, LLVM/C++.
@Coalfire-Research
Coalfire Labs R&D Coalfire-Research
Advancing the state of the Infosec industry by providing cutting-edge research, open-source tools and tradecraft
@xalicex
Alice xalicex
Offsec, Malware & Stuff
@IdanBanani
Idan BananI IdanBanani
Low level SW Security, Reverse engineering , Vulnerability research, Exploits development.

Idan Banani Israel

@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@gabe-k
Gabe Kirkpatrick gabe-k
on the computer

Seattle, WA

@iosre
iOSRE iosre
Things about iOS Reverse Engineering

China

@raminfp
Ramin Farajpour Cami raminfp
Software | Security | Blockchain (Web3 - Solana) Engineer

Matrix

@embee-research
Matthew embee-research
Security Research and Threat Intelligence