🔓 Master of the virtual heist. Unlocks cyber doors while wearing a white hat. OSEP-certified ethical hacker, converting caffeine ☕ and curiosity 🤔 into code.
- United States
- https://linktr.ee/dylanevans11
Sponsors
Christian Scott
christiancscott
🔐 Cybersecurity & Technology Business Leader |
🎓 Cybersecurity Researcher & Educator
Christian Kelechi Eze
christiankelechi
My name is Christian Eze,
A sofware engineer majoring on full stack web development, Ai based
Technologies, currently using: Python,django,opencv,react,html
Enugu - Unn
HAHA168
coderup2u
Beginner Software & Reverse Engineer | Always Learning in C、C++、Python、GO、Rust、ASM、Java & AI
Phil Miller
mr-pmillz
Black Hills Information Security - Security Analyst, Tester
Black Hills Information Security Black Hills, South Dakota
Maor Tal
RootInj3c
Red Teamer & Penetration Tester - Red at night, blue in the morning (sometimes vice versa). Believe in breaking it, fixing it, securing it.
Cyberspace
Rao Ali Hassan
raoalihassan228
Agentic AI Developer • MERN stack + FastAPI + Cloud Native architecture & Microservices • Aspiring Data Scientist💻
@unicornstartupai Karachi, Pakistan
Mor David
MorDavid
All code, software, writeups, and resources on this profile are licensed under CC BY-NC unless stated otherwise.
CYE Israel
Regan Temudo
regantemudo
Ethical Hacker | Penetration Tester | SOC Analyst | CTF Creator | OSINT Researcher | Author
HeHeHeHe
Theodosis Paidakis
theopaid
Penetration Tester. From writing code to breaking code :)
Athens, Greece
torykuzzaman tonoy
tk-t0n0y
Roots of vulnerability are same like old . new is the exploit process . 👿
localhost
PreviousNext