Skip to content
View django-88's full-sized avatar

Sponsoring

@mgeeky
@RedByte1337

Block or report django-88

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@plackyhacker
John Tear plackyhacker
I am me... just an amateur malware developer. If you use my code, don't be naughty, keep it legal!!!
@ineesdv
Inés Martín ineesdv
Offensive Security

Spain

@SaadAhla
SaadAhla SaadAhla
Security researcher, malware dev

Morocco

@paranoidninja
Paranoid Ninja paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting

Dark Vortex Last seen in Ring 0. Current Location Unknown

@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@klezVirus
klezVirus
Lucky husband, proud father, and security researcher

SpecterOps

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | co-founder of maldevacademy.com
@tijme
Tijme Gommers tijme
Adversary Simulation - TIBER - ART - Red Teaming

@ABNAMRO The Netherlands

@0xthirteen
Steven F 0xthirteen
Service architect at SpecterOps

SpecterOps

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@RWXstoned
RWXstoned RWXstoned
Offensive security tools and notes

in memory

@ZERODETECTION
ZERODETECTION ZERODETECTION
Offensive Research and Development

ZERODETECTION

@Raulisr00t
Raul Raulisr00t
Windows System Programming / Low Level Engineering / Offensive Tool Development
@MalFuzzer
Uriel Kosayev MalFuzzer
Cybersecurity Researcher | Keynote Speaker | Author of MAoS - Malware Analysis on Steroids & Antivirus Bypass Techniques | Co-Founder

https://trainsec.net

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@helviojunior
Helvio Junior (M4v3r1cK) helviojunior
Malware and Security Researcher | OSCE3 | OSEP | OSED | OSCE | OSCP | OSWE | eCXD | eMAPT | CEH.

@sec4us-training Curitiba, PR, Brazil

@WKL-Sec
White Knight Labs WKL-Sec

White Knight Labs USA

@gwen001
Gwendal Le Coguic gwen001
Bug hunter, tool maker.

Paris - France

@laniakeactf
Laniakea CTF laniakeactf
Official GitHub account of the Laniakea CTF team.
@ar0x4
ar0x ar0x4
Infosec Enthusiast.

Austria

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@cpu0x00
cpu0x00
the mocking bird
@Zeyad-Azima
Zer0verflow Zeyad-Azima
Offensive Person, who is playing around the core of the 7 layers to build the 0Day Empire.

Malaysia

@coffinxp
coffin coffinxp
Security Researcher | OSINT Specialist | Content Creator

Moscow