Skip to content
View danikdanik's full-sized avatar

Block or report danikdanik

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@neatlabs-ai
NeatLabs™ neatlabs-ai
NeatLabs™ — AI-powered cybersecurity, compliance, OSINT, and operational intelligence platforms. Bringing Context to Chaos.

United States of America

@jacob-bd
Jacob Ben-David jacob-bd
I am learning to code with AI. Cursor, Claude, v0, and Replit are my best dev buddies.

Toronto, ON, Canada

@azurekid
Rogier Dijkman azurekid
Microsoft Security MVP | Security Researcher | Professional Troublemaker

Amersfoort, Utrecht, NL

@ansible-lockdown
Ansible Lockdown ansible-lockdown
Lockdown is a security baseline automation project sponsored by Tyto Athene.
@SkipToTheEndpoint
James Robinson [MVP] SkipToTheEndpoint
Microsoft MVP - Intune & Windows. Cloud-Native Endpoint Advocate. Neurodivergent Loudmouth.
@dis0rder0x00
dis0rder0x00

Berlin, Germany

@malvuln
malvuln
Security Researcher: John Page (aka hyp3rlinx), created the Malvuln project and discovered many vulnerabilities in enterprise software.
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | co-founder of maldevacademy.com
@ionescu007
Alex Ionescu ionescu007
CTIO at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.windows-internals.com

Winsider Seminars & Solutions Inc.

@es3n1n
Arsenii es3n1n es3n1n
slightly below average

not_es3n1n on discord

@jonny-jhnson
Jonathan Johnson jonny-jhnson
Windows Internals Research and Telemetry Identification

USA

@0xTriboulet
Steve S. 0xTriboulet
Allegedly some kind of researcher
@ForbiddenProgrammer
ForbiddenProgrammer
Contact: forbidden_programmer@protonmail.ch

Cybersecurity Intelligence :> Poland

@m0chan
m0chan
https://pentestly.io
@ValdikSS
ValdikSS ValdikSS

ProstoVPN.org Russia

@3xp0rt
3xp0rt

@prodaft Ukraine

@phra
Francesco Soncina phra
OSCE // OSCP // Ethical Hacker & Red Teamer // Full Stack Developer // JavaScript Enthusiast // Staff Member of @BolognaJS // CTF player at @d0nkeys

@d0nkeys @BolognaJS Amsterdam, NL

@Sh0ckFR
Sh0ckFR
Red Team Operator

Somewhere in Space

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My learning platform links: https://truecyber.world https://mr.un1k0d3r.world

TrueCyber Inc.

@Unknow101
Unknow101
GIAC | PENTESTER | FORENSIC ANALYST
@Ian-Costa18
Ian Costa Ian-Costa18
Passionate about Cyber Threat Intelligence & Cybersecurity in general. Love Python
@Cluster25
Cluster25 Cluster25
Cyber Intelligence Research and Adversary Hunting Group

Cluster25 Earth

@obsti8383
obsti8383 obsti8383
Info Sec. Consultant, based in Germany

Munich

@G4LB1T
Gal Bitensky G4LB1T
Throwing simple code blocks at bad guys

Tel-Aviv

@enaqx
Nick Raienko enaqx
Full Stack Software Engineer