Skip to content
View eremit4's full-sized avatar

Block or report eremit4

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@PaloAltoNetworks
Palo Alto Networks PaloAltoNetworks
We ensure each day is safer and more secure than the one before.

United States of America

@ANG13T
Angelina T (G4LXY) ANG13T
Developer with a passion for embedded systems, satellite tech, SIGINT, and software development

Stellaryx Labs

@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.
@osintbrazuca
OSINT Brazuca osintbrazuca
Projeto criado com intuito de reunir informações, fontes e tricks de OSINT dentro do contexto Brasil By: @c4nh0t0 e @MrCl0wnLab
@nasa
NASA nasa
ReadOpen Data initiative here: https://www.nasa.gov/open/ & Instructions here: https://github.com/nasa/nasa.github.io/blob/master/docs/INSTRUCTIONS.md

United States of America

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | co-founder of maldevacademy.com
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@moval0x1
Charles Lomboni moval0x1
Malware Analyst who loves technology, music, nature and sleep.

@securityjoes

@leandrofroes
Leandro Fróes leandrofroes
Reverse engineer. Mostly interested in Windows Internals and low-level programming.
@P4nD3m1CB0Y0xD
Þ4ŊD³m¹©BøY P4nD3m1CB0Y0xD
Reverse engineering 🔧 Malware lover ☢ Low level 🔍

somewhere between us and them

@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@tracelabs
Trace Labs Organization tracelabs
We crowdsource OSINT to help find missing people.
@soxoj
Soxoj soxoj
CPO @ Social Links

Social Links Amsterdam, Netherlands

@m3ll0c
Gabriel Melo m3ll0c
Threat Hunter | Coder | Computer Scientist

Itaú Unibanco | FEI São Paulo, Brazil.

@aJesus37
Anderson de Jesus aJesus37
Code makes life easier! =D

São Paulo, Brazil

@mitre-attack
MITRE ATT&CK mitre-attack

United States of America

@fernandoans
Fernando Anselmo fernandoans
Especialista formado em Gestão da Tecnologia da Informação, Java Champion, Analista de Sistemas e Professor Universitário.

Decus in Labore Brasília - DF

@SigmaHQ
Sigma SigmaHQ
A generic rule format to express search queries on log data
@thehappydinoa
Aidan Holland thehappydinoa
Senior Security Researcher @censys

@censys ~

@bellingcat
Bellingcat bellingcat
An independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research.
@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@BushidoUK
BushidoToken BushidoUK
Security Researcher

@curated-intel

@malware-unicorn
malwareunicorn malware-unicorn
MALWARE + FASHION = UNICORN Reverse Engineering Malware twitter: @malwareunicorn

San Francisco

@RussianPanda95
RussianPanda RussianPanda95
Senior Threat Intelligence Researcher | Malware Addict | Threat Hunter

TRAC Labs The United States

@deptofdefense
U.S. Dept of Defense deptofdefense
Defense Digital Service

The Pentagon

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International