Skip to content
View gelven4sec's full-sized avatar
💭
(☞°ヮ°)☞
💭
(☞°ヮ°)☞

Organizations

@MindBreak-ESGI @hacklab-esgi

Block or report gelven4sec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@bkerler
Bjoern Kerler bkerler
3D printing and iot firmware developer

@revskills@infosec.exchange Europe

@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@GrapheneOS
GrapheneOS GrapheneOS
Security and privacy focused mobile OS with Android app compatibility. We focus on developing substantial privacy and security improvements.

Toronto, Ontario, Canada

@0xdea
raptor 0xdea
Polyglot programmer of weird machines.

@hnsecurity Italy

@pwno-io
Pwno pwno-io
the r&d startup for memory security
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@charlotte-os
CharlotteOS charlotte-os
An Experimental Modern Operating System

United States of America

@hakaioffsec
Hakai Security hakaioffsec
We discover security flaws that your team would never have thought of.

Brazil

@osm0sis
osm0sis
Android flashable zips, scripts, bins & automation. Creator of AnyKernel3 & Android Image Kitchen. Check my "Odds & Ends" thread link for a comprehensive list.
@pwnfuzz
PwnFuzz pwnfuzz
Offensive R&D lab focused on exploit engineering, kernel exploits, and fuzzing.
@FrameworkComputer
Framework FrameworkComputer
Remaking consumer electronics to respect people and the planet

California

@trailofbits
Trail of Bits trailofbits
More code: binary lifters @lifting-bits, blockchain @crytic, forks @trail-of-forks

New York, New York

@r0keb
Ö r0keb
Low level enthusiast
@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@extremecoders-re
extremecoders-re
Security Researcher

Sol III

@androguard
Androguard androguard
Reverse engineering (static/dynamic analysis) of Android applications
@Synacktiv-contrib
Synacktiv Synacktiv-contrib
Synacktiv official ninja repository

Synacktiv Paris - France

@androidoffsec
Android Offensive Security androidoffsec
Android Offensive Security @ Google
@MatheuZSecurity
MatheuZ MatheuZSecurity
Red Team Operator | Threat Intelligence | Security Researcher | Malware Researcher

Brazil

@cea-sec
CEA IT Security cea-sec
IT Security at the French Alternative Energies and Atomic Energy Commission

France

@DebugPrivilege
DebugPrivilege DebugPrivilege
Security Person with interest in troubleshooting problems on Windows.
@praetorian-inc
Praetorian praetorian-inc
Praetorian provides a suite of security solutions that enable clients to solve cybersecurity problems across their enterprise and product portfolios.

US (Austin, TX)

@hacklab-esgi
HackLab ESGI hacklab-esgi
Code repositories for the students of the HackLab from the ESGI school.

France

@zblurx
zblurx
OffSec / Python3 / Rust / Go / Docker

France

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@LaurieWired
LaurieWired
Reverse engineer specializing in cross-platform malware analysis with a focus on mobile threats.
@BushidoUK
BushidoToken BushidoUK
Security Researcher

@curated-intel

@Sh4N4C1
ShaNaCl Sh4N4C1
[OSCP] ✔️ [OSEP] ✔️ Malware developer
@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@Nariod
Nariod
:wq!

France

@ElNiak
ElNiak
I’m a cybersecurity researcher and teaching assistant at UCLouvain.

UCLouvain Belgium

@frostb1ten
Frostb1te frostb1ten
Cybersecurity Researcher | Dad | US Navy vet
@lsecqt
Lsec lsecqt
OSEP / OSCP / Penetration Tester / Vulnerability Researcher / Youtuber