Skip to content
View fdx-xdf's full-sized avatar

Highlights

  • Pro

Block or report fdx-xdf

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@mahaloz
Zion Leonahenahe Basque mahaloz
Native Hawaiian | PhD Student @sefcom in Comp Sci | Prev Co-captain @shellphish | Decompiler Research

Arizona State University

@miunasu
miunasu
APT Malware analysts

moon

@lt-asset
ASSET Research Lab at Purdue University Lead By Dr. Lin Tan lt-asset
AI-Software Synergy Research At Purdue University Lead By Dr. Lin Tan
@n-WN
Zoee n-WN
Cryptography | DevOps | LatticeBased [at] Outlook [dot] com

正规子群

@tanweai
Tanwe AI tanweai
Tanweai ,limited. Intent security
@SecTeamPolaris
PolarisIIE SecTeamPolaris
Polaris is a security team from IIE, CAS. We focus on computer vision, network security, malware, and APT detection.

Institute of Information Engineering, Chinese Academy of Sciences Beijing, China

@fuchuanpu
Kevin Chuanpu Fu fuchuanpu
A final-year Ph.D. candidate at Tsinghua.

Tsinghua University Ziqiang Science and Technology No.1 Building

@Konano
Nano Konano
Wake → Code → Sleep → Repeat ⤶

AS14-Papa-06 @ Ingress

@0xTriboulet
Steve S. 0xTriboulet
Allegedly some kind of researcher
@pard0p
pard0p
“Honor is dead, but I’ll see what I can do”

Valencia

@GoSSIP-SJTU
GoSSIP@SJTU GoSSIP-SJTU
Group of Software Security In Progress (G.O.S.S.I.P) 蜚语软件安全小组,来自上海交通大学

Shanghai Jiao Tong University Shanghai, China

@InfinityCurveLabs
InfinityCurve Labs InfinityCurveLabs
Forging the Future of Offensive Security

Austria

@UCASZ
UCASZ UCASZ
An Apprentice Forever.

University of Chinese Academy of Sciences

@yo-yo-yo-jbo
Jonathan Bar Or yo-yo-yo-jbo
Security researcher, working on most major OS (Windows, macOS, Linux, iOS, Android, ChromeOS).
@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@9Insomnie
n0irx 9Insomnie
Red Team Ops | Stay quiet, move deep

0.0.0.0 127.0.0.1

@SweetIceLolly
Hanson SweetIceLolly
𝓢𝔀𝓮𝓮𝓽 𝓘𝓬𝓮 𝓛𝓸𝓵𝓵𝔂.

⁄(⁄ ⁄•⁄ω⁄•⁄ ⁄)⁄ (✿◡‿◡)

@wecooperate
wecooperate
拒绝内卷、合作共赢 | wecooperate、wewin
@TryGOTry
Try TryGOTry
一个搞安全的菜鸡脚本小子罢了。

tryblog@t00ls.net

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@0xflux
flux 0xflux
Senior Security Research Engineer @elastic. Former Red Team engineer. Passionate about cyber defence, security research, and systems programming.

North West, England

@microsoft
Microsoft microsoft
Open source projects and samples from Microsoft

Redmond, WA

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@1ncendium
Remco van der Meer 1ncendium
Security researcher, pentester
@Whitecat18
Smukx ♠ Whitecat18
Offensive code writer. 20 y/o.

0.0.0.0 127.0.0.1

@akamai
Akamai akamai
A collection of official Akamai tools, community projects, and other goodies.
@BlackSnufkin
BlackSnufkin BlackSnufkin
Red-Teamer & Malware Dev | CRTL
@AdvancedCompiler
AdvancedCompiler AdvancedCompiler
上承软件,下启硬件,前奉推理,后擎训练。
@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@connormcgarr
Connor McGarr connormcgarr

United States of America

@es3n1n
Arsenii es3n1n es3n1n
slightly below average

not_es3n1n on discord

@RalfHacker
Ralf RalfHacker
Pentest, Red Team, Offsec Dev
@bfengj
feng bfengj
不悔梦归处,只恨太匆匆

北京

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@jm33-m0
Jimmy Mi jm33-m0
5BEF5813ACA297CEA6F74C32FD7899D296E6FCE2

Monash University Clayton

@yifengyou
游~游~游 yifengyou
一天不科研,浑身都难受~

Tencent ShenZhen

@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Earth

@3gstudent
3gstudent
good in study,attitude and health.
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@c1y2m3
c1y2m3
开发中...

beijing