Skip to content
View bsoddreams's full-sized avatar
💭
I dream of kernel panics.
💭
I dream of kernel panics.

Block or report bsoddreams

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@msuiche
Matt Suiche msuiche
I can't speak English.

Global

@gaasedelen
gaasedelen
turning over rocks and finding nothing is still progress.
@FuturesLab
FuTURES³ Lab @ The University of Utah FuturesLab
Future Technology for Usable, Reliable, and Efficient Security of Software and Systems

United States of America

@pgoodman
Peter Goodman pgoodman
Program transformer, binary translator
@HexRaysSA
Hex-Rays SA HexRaysSA
Hex-Rays - State of the art binary code analysis tools
@HexHive
HexHive HexHive
Enforcing memory safety guarantees and type safety guarantees at the compiler and runtime level

Switzerland

@Oliver-1-1
Oliver Oliver-1-1

Swedish school Sweden

@ekknod
ekknod ekknod
Anti-Cheat developer for ekknod.xyz

ekknod.xyz Finland

@KiFilterFiberContext
KiFilterFiberContext
Undergrad CS student at Arizona State

United States

@Naville
Zhang Naville
SMT / SAT, Math, Compiler & Kernel Infrastructure.

miHoYo / HoYoverse / COGNOSPHERE lib/Analysis

@Pusty
Leeky Pusty
Low-Level Programmer with a love for the obscure, undocumented and borderline magical.

Germany

@Dasharo
Dasharo Dasharo
We are crafting a scalable, modular, and easy to combine BIOS firmware technology to help you improve your products without boundaries on processor architecture

Gdańsk, Poland

@rogxo
Rog rogxo
C/C++, Reverse Engineering, Disassembly, Windows/Android Internals & Low-level stuff, Exploitations, Penetration Test and more...

Reverse Engineering Co. Ltd. Metaverse

@extremecoders-re
extremecoders-re
Security Researcher

Sol III

@memN0ps
memN0ps

New Zealand

@Wack0
Rairii Wack0
Some people port Doom to things, I port NT to things.
@immunant
Immunant immunant
Information Security R&D

Irvine, California

@blacktop
blacktop

Nowheresville

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | co-founder of maldevacademy.com
@lifting-bits
Lifting Bits lifting-bits
Binary Translation by @trailofbits

New York, NY

@securesystemslab
Secure Systems Lab securesystemslab

University of California, Irvine

@trailofbits
Trail of Bits trailofbits
More code: binary lifters @lifting-bits, blockchain @crytic, forks @trail-of-forks

New York, New York

@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@RiotVanguard

@joxeankoret
Joxean joxeankoret
I analyse, break and code stuff in no specific order.

Basque Country

@athre0z
Joel Höner athre0z
I build stuff that makes other stuff faster. Co-founder at @zystem-io, co-creator of Zydis.

@zystem-io Germany

@0xGREG
0xGREG
Currently: Windows COM, Kernel, UEFI.
@williballenthin
Willi Ballenthin williballenthin
/usr/bin/nethack

@HexRaysSA