Skip to content
View d5fa4lt's full-sized avatar
🧩
Working
🧩
Working

Block or report d5fa4lt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@klezVirus
klezVirus
Lucky husband, proud father, and security researcher

SpecterOps

@zero2504
Zero2504 zero2504
Security researcher focused on Windows Internals & Malware Development / Happily married

Germany

@waldo-irc
waldo-irc
Just a guy made of green pixels.
@dlima04
dlima dlima04
-

Toronto, Ontario

@RalfHacker
Ralf RalfHacker
Pentest, Red Team, Offsec Dev
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@matterpreter
Matt Hand matterpreter
Aut viam inveniam aut faciam

@preludeorg USA

@matro7sh
matro7ch habibi matro7sh
Pentester tools

127.0.0.1

@jenaye
H Mike jenaye
Red team operator for @Orange-Cyberdefense Creator of @matro7sh & michmich.eu

@Orange-Cyberdefense @Inshallhack @matro7sh Marseille

@mogoryoz
0xhm mogoryoz
PeNeTrAtIoN TesTeR , CTF PLAYER
@offalltn
offalltn
Offensive Security Engineer
@kleiton0x00
kleiton0x00 kleiton0x00
Yet another infosec guy.

Austria

@UvuvDev
Bradley Fernandez UvuvDev
Software Dev intern at Redseer. Reverse Engineering CTF competitor. Member of UCF's C3 Team.

Redseer

@0xJs
0xJs 0xJs
Jony Schats

@HackDefenseNL

@Offensive-Panda
Usman Sikander Offensive-Panda
An infosec guy who's constantly seeking for knowledge.

Cytomate solutions and services Qatar

@CodeXTF2
CodeX CodeXTF2
Red teamer and offensive dev. I pop shells and play tf2.

in your walls userland

@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@0xInfection
Pinaki 0xInfection
I am just an infected geek. =)

@watchtowrlabs Kolkata, India

@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@eaneatfruit
eaneatfruit
Penetration Tester. Scripts, projects, misc. OSCP, GWAPT, OSCE
@med0x2e
Mohamed El Azaar med0x2e
RedTeamer & Security Researcher, used to be a Software Engineer/Developer, Manga/Anime Otaku

Yo. 127.0.0.1

@deepinstinct
Deep Instinct deepinstinct
Deep Instinct's Research Team
@paskalian
Paskalian paskalian
just another human being.
@zeze-zeze
Zeze zeze-zeze

TeamT5 Taiwan

@lab52io
lab52.io lab52io
Lab52 is the threat intelligence division of S2 Grupo, an international cybersecurity company that offers its services around the world.

S2 Grupo Spain

@mez-0
Mez0 mez-0
¯¯̿̿¯̿̿'̿̿̿̿̿̿̿'̿̿'̿̿̿̿̿'̿̿̿)͇̿̿)̿̿̿̿ '̿̿̿̿̿̿\̵͇̿̿\=(•̪̀●́)=o/̵͇̿̿/'̿̿ ̿ ̿̿

@TrustedSec United Kingdom

@ethereal-vx
ethereal-vx
malware uwu

Ring 0

@sailay1996
valen sailay1996
Just an idiot, a tiny presence in an infinite universe. S-1-5-7

Myanmar

@helpsystems
HelpSystems helpsystems
Software, Services, and Support That Make Your Life Easier.
@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@aaaddress1
Sheng-Hao Ma aaaddress1
30cm.tw/me

TXOne Networks Inc. Taiwan

@passthehashbrowns
passthehashbrowns
Red teamer/mediocre developer
@Idov31
Ido Veltzman Idov31
I'm a security researcher and using this platform to share my projects and research :)

mov rax, [rbp+location]

@Cerbersec
Cerbersec Cerbersec

MDSec Underworld