Skip to content
View cra0's full-sized avatar

Organizations

@thesecretclub

Block or report cra0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@bbaranoff
bastien baranoff bbaranoff
PoCs or others : the names try to specify what it INTEND to do (not what it do ;) ) Have fun and enjoy !

bbaranoff Perpignan

@BitBangingBytes
Hash BitBangingBytes
Forward and Reverse Engineering
@DangerousPrototypes
Ian DangerousPrototypes

Dangerous Prototypes hackers in space

@danielweidman
Dani Weidman danielweidman
Software Engineer in Cleveland, OH. I love hacking around and figuring out how things work.

Cleveland, OH

@samyk
samy kamkar samyk
explo(r|it)ing boundaries

los angeles

@sueppchen
Mathias sueppchen

technican germany

@memN0ps
memN0ps

New Zealand

@hzqst
hzqst hzqst
Game Security & Game Engine & Realtime Rendering

Super Earth

@Peribunt
ReaP Peribunt
Reverse engineer interested in Windows internals. Sometimes I publish stuff
@mgoodings
Dylan Goods mgoodings
Software Architect, DevOps Engineer & Independent Security Researcher

Melbourne, Australia

@ufrisk
Ulf Frisk ufrisk
IT-Security Minion

Sweden

@lguilhermee
Lucas lguilhermee
C++ Developer, Reverse Engineering
@ionescu007
Alex Ionescu ionescu007
CTIO at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.windows-internals.com

Winsider Seminars & Solutions Inc.

@HadiMed
Mohammed Hadi HadiMed
waste CPU cycles, rather than be sorry.
@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@armvirus
armvirus
Discord: flushin
@KANKOSHEV
KANKOSHEV

Russia, Moscow

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@0xnobody
Adam Niezabitowski 0xnobody
I like breaking stuff.

Ireland

@impost0r
impost0r impost0r
Reverse engineer and vulnerability researcher. XNU/Unix focus, some Windows.

@thesecretclub (former)

@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@RiotVanguard

@xenocidewiki
xenocidewiki xenocidewiki
Programmer and reverse engineer

Norway

@vmcall
vmcall

@thesecretclub