Samy Lahfa
AkechiShiro
Computer are full of assumption, acquiring knowledge of those is hard but necessary in security @NixOS @winapps-org @Athena-OS @Red-Flake
France
agnosticlines
reverse engineering, program analysis and exploit dev |
i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects
[object Object] /dev/kmem
Kelsey Dawes
kdawes
Started in Embedded Systems. Later joined the dark side - now I write a lot of javascript, full-stack.
Saskatoon, SK, Canada
Jevin Sweval
jevinskie
Senior Security Researcher, compilers/optimizations/[de]obfuscation, SCA, program analysis, NFC ninja, HW hacker w/ FPGA hammer. Previously Apple Pay Security.
Lafayette, Indiana
Minh-Triet Pham Tran
trietptm
APT Hunter, Threat Hunter, Incident Responder, Forensics Analyst, Information Security Consultant, Red Teamer (Network+System views)
TRIETPTM INFOSEC Vietnam