Skip to content
View hexamine22's full-sized avatar

Block or report hexamine22

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@ergrelet
Erwan Grelet ergrelet
Fond of reverse engineering and software development. Doing security engineering at some company.

Montreal, QC

@mmert11
Mestan Mert Kana mmert11
Student interested in reverse engineering, low level programming, open source development and UAVs.
@haram
haram
"yousif" "paracord"

The Netherlands

@keowu
João Vitor keowu
Security Researcher | i like All OS Internals, Malware & Reverse Engineering, C++, Intel/ARM Assembly and cool things | Jesus Follower

São Paulo & Shizuoka-Ken

@hgarrereyn
Harrison Green hgarrereyn
PhD student at CMU / Reverse Engineer @dicegang / Senior Otter @otter-sec

OtterSec Pittsburgh

@ioncodes
Layle ioncodes
part time stack frame counterfeiter

0x41414141

@NeoMaster831
Wane NeoMaster831
Wane-Wein-Wayn

@Porthas-Inc Incheon

@cea-sec
CEA IT Security cea-sec
IT Security at the French Alternative Energies and Atomic Energy Commission

France

@ElvisBlue
Elvis ElvisBlue
I use github to post my random stuffs. Noob coder ):
@kumailzaidi23
Strangek kumailzaidi23
one of the possibilities

Islamabad

@papadoxie
Nofil Qasim papadoxie
Sr. Vulnerability Researcher at Ebryx LLC.

@Ebryx Pakistan

@stong
cts stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue. Previously @Vector35, @sslab-gatech.

@Zellic 0x4141414141414141

@the-m3chanic
Suraj Kumar the-m3chanic
Reverse Engineer @teambi0s

@teambi0s

@Pusty
Leeky Pusty
Low-Level Programmer with a love for the obscure, undocumented and borderline magical.

Germany

@RoderickChan
Roderick RoderickChan
xml engineer

Wuhan@China

@mahaloz
Zion Leonahenahe Basque mahaloz
Native Hawaiian | PhD Student @sefcom in Comp Sci | Prev Co-captain @shellphish | Decompiler Research

Arizona State University

@MaherAzzouzi
MaherAzzouzi MaherAzzouzi
Vulnerability Research & Exploit Development

Morocco

@DhavalKapil
Dhaval Kapil DhavalKapil
Software Security Enthusiast & Software Developer; Past: GSoC '15 & '16, @sdslabs, @amzn, IIT Roorkee

Georgia Tech Atlanta, GA

@TheFlash2k
Ali Taqi Wajid TheFlash2k
literally a write what where primitive

AirOverflow Rawalpindi, Punjab, Pakistan

@clowncs
Peter clowncs
dunno what to do
@ctf-mt
Friendly Maltese Citizens ctf-mt
Malta's #1 CTF team / sponsored by @congruential

Malta

@iMarble
Marble iMarble
Lost in the code.
@scwuaptx
Angelboy scwuaptx
HITCON CTF/DEVCORE

Taiwan

@auk0x01
Adnan Ullah Khan (auk0x01) auk0x01
Application Security Engineer | Penetration Tester | CTF Player
@meowette
felicia meowette
meoww mrrrp                                             pfp by @mon__38_ (on twitter)

contact@feli.pet

@nobodyisnobody
Nobody nobodyisnobody
Security Researcher, Defcon 30/31/32 finalist, pwner for Water Paddler & Blue Water. you can contact me on discord: nobodyisnobody#5709 rebooting.

Auberge de la grande Ourse Stranger in a strange land..

@huettenhain
jesko huettenhain
Mathmatician & Hacker.

Germany

@Porthas-Inc
Porthas Inc Porthas-Inc

United States of America

@falconre
Falcon Binary Analysis Framework falconre
Binary Program Analysis in Rust
@somedieyoungZZ
somedieyoungZZ
Malware and DFIR
@Xyrem
Aryan Xyrem
I like exploring and breaking stuff.