4ra1n
4ra1n
Security Researcher, Contributors of chaitin/xray vulnerability scanner, vulhub and java-chains, Creator of jar-analyzer and class-obf project.
算力基础设施安全研究团队
DCSec
算力基础设施安全研究团队隶属于中国科学院信息工程研究所,面向超融合智算、云网融合、云边端协同等新型算力架构,开展网络、系统和数据层面的体系化内生安全研究,聚焦可信操作系统、零信任云计算平台、软件定义算力基础设施等研究方向。
Institute of Information Engineering, Chinese Academy of Sciences Beijing,P.R.China
Yechan Bae
qwaz
Security Researcher at Microsoft Security AI (MSECAI). Previously at @theori-io (@qwaz-theori) and @sslab-gatech.
@microsoft
Mathias Hall-Andersen
rot256
PhD in Cryptography/CS. Kalmarunionen CTF player. Cofounder / cryptographer at ZKSecurity. Always building / breaking systems.
@zksecurity
wszqkzqk
wszqkzqk
Community Leader of Arch Linux for Loong64 / A Vala & Python Software Developer / Major in Chemistry / PGP: 8C7F6B7B9B90AE02C2ACB633F0647F18A79089C9
Peking University Beijing & Chongqing
Ricter Zheng
RicterZ
uid=1337(ricter) groups=1001(hacker),1002(acg),1003(security)
Independent Security Researcher
exp-sky
exp-sky
Senior Security Researcher, Pwn2Own 2017 Winner and Tianfu Cup 2018, 2019 Winner. MSRC top 100 2015-2019.
killvxk
在你面前的是:大宗师,大德鲁伊,屠魔者,死亡领主,大领主,大法师,先知,大祭司,战争领主,虚空领主,狩猎大师,暗影之刃,奈非天,白狼,昆特牌的大师,猎魔人,守望先锋成员,单排吃鸡者。
USSR
GoSSIP@SJTU
GoSSIP-SJTU
Group of Software Security In Progress (G.O.S.S.I.P)
蜚语软件安全小组,来自上海交通大学
Shanghai Jiao Tong University Shanghai, China
agnosticlines
reverse engineering, program analysis and exploit dev |
i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects
[object Object] /dev/kmem
lokihardt
l0kihardt
Independent Security Researcher, Pentester, Former CTF Player @FlappyPig @r3kapig. Also a big fan of lokihardt. Now focusing on **Finance** and **Quant**.
TaiPei China
PreviousNext