Skip to content
View evilAdan0s's full-sized avatar
😅
😅

Block or report evilAdan0s

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@watchtowrlabs
watchTowr Labs watchtowrlabs
Labs division of watchTowr
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@g3tsyst3m
R.B.C. g3tsyst3m
CISSP, Security Professional and Researcher with over a decade of experience. I'm fairly low profile, but share useful info from time to time.

Kentucky

@chainreactors
chainreactors chainreactors
for red team! for offensive infrastructure! for future!
@Esonhugh
Esonhugh Skyworship Esonhugh
Your sincere exploitation/malware developer, Cloud Hacking Helper and golang developer. Do what no one has ever done

EsonCloud in Cloud

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@SafeBreach-Labs
SafeBreach Labs SafeBreach-Labs
SafeBreach Labs

Worldwide

@flipperdevices
Flipper Devices flipperdevices
Flipper Devices open source projects
@ASkyeye
ASkyeye
RedTeam fork robot. ⚠️Please check the source code carefully before using the tool. :)
@0cat-r
0cat 0cat-r
好好学习,天天向上
@c1y2m3
c1y2m3
开发中...

beijing

@connormcgarr
Connor McGarr connormcgarr

United States of America

@AgeloVito
AgeloVito
balabala

Waiting Earth

@Y4Sec-Team
Y4 Security Team Y4Sec-Team
Security Team mainly working on Java vulnerability research
@c0ny1
c0ny1 c0ny1
做酷的事
@l3m0n
l3m0n
招红队,实习正式都可以,简历请发hr#lichoin[dot]com

Syclover

@pmiaowu
P喵呜 pmiaowu
尊敬的黑客,您好,您当前浏览的是国家一级保护废物,P喵呜-PHPoop,请文明观看,请勿投食╰(*°▽°*)╯
@TheKingOfDuck
鸭王 TheKingOfDuck
Infosec Researcher | Coder | Social Observer | Shitologist|Go|Python|Java|JS

Shitologist

@evilpan
evilpan evilpan
explore, exploit, expose!

An7 Homeless

@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Earth

@zhzyker
之乎者也 zhzyker
天苍苍,野茫茫,风吹的我就像头羊~ @0-sec && @pwnwiki-project && @xiecat

@0-sec @xiecat @pwnwiki-project @cisp-pte @YanYun-Lab ${jndi:ldap://127.0.0.1/zhzyker}

@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@ehsandeep
Sandeep Singh ehsandeep
Co-Founder / CTO @projectdiscovery On a mission to simplify the security process and make it more accessible.

@projectdiscovery India

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | co-founder of maldevacademy.com
@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@su18
素十八 su18
你救赎的人 终将成为你的光

Beijing

@shaokeyibb
HikariLan shaokeyibb
半栈工程师 | Half-stack engineer | 🇨🇳

@DiDi Hangzhou, China

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@Tas9er
Tas9er
Has never participated in any cybersecurity operations of any country or region, and will not do so in the future either / 從未參與任何國家或者地區的任何網絡安全技術行動,以後也是如此
@Cracked5pider
5pider Cracked5pider
Software Dev @ InfinityCurve Labs

@InfinityCurveLabs

@TryGOTry
Try TryGOTry
一个搞安全的菜鸡脚本小子罢了。

tryblog@t00ls.net

@knightswd
knight knightswd
RedTeam

Red Team of JD Beijing

@seventeenman
Su ShengLu seventeenman
RedTeamer | CTFer

lab null

@qi4L
qi4L
工欲善其事,必先利其器。

香港科技大学

@paranoidninja
Paranoid Ninja paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting

Dark Vortex Last seen in Ring 0. Current Location Unknown