Skip to content
View kai6u's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report kai6u

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@bjrjk
Jack Ren bjrjk
Pursuit for a broad horizon.
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@ValdikSS
ValdikSS ValdikSS

ProstoVPN.org Russia

@memN0ps
memN0ps

New Zealand

@mttaggart
Michael Taggart mttaggart

@The-Taggart-Institute

@kyleavery
Kyle Avery kyleavery
debugging with printf

@outflanknl Texas, USA

@byt3bl33d3r
Marcello byt3bl33d3r
T H I C C M A L W A R E

Palo Alto Networks Error: Unable to resolve

@ElliotKillick
Elliot Killick ElliotKillick
Security engineer and researcher. Avid developer. Infosec aficionado

Application Security Engineer Toronto, Canada

@RalfHacker
Ralf RalfHacker
Pentest, Red Team, MalDev
@d1rkmtrr
d1rk d1rkmtrr
Security researcher, malware dev

Morocco

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@snovvcrash
snovvcrash snovvcrash
Sr. Penetration Tester / Red Team Operator, author of the Pentester’s Promiscuous Notebook

(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻

@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@HuskyHacks
Matt Kiely HuskyHacks
Principal Security Researcher @huntresslabs
@passthehashbrowns
passthehashbrowns
Red teamer/mediocre developer
@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@Cerbersec
Cerbersec Cerbersec

MDSec Underworld

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@SpecterOps
SpecterOps SpecterOps

United States of America

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@leesh3288
Seunghyun Lee leesh3288
Xion

Carnegie Mellon University Pittsburgh, PA

@hakaioffsec
Hakai Security hakaioffsec
We discover security flaws that your team would never have thought of.

Brazil

@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@cobbr
Ryan Cobb cobbr

SpecterOps Dallas, TX

@EvilBytecode
EvilBytecode
For educational purposes only. Explicit authorization required. No warranties. Author disclaims all responsibility for unauthorized use.

TM. Codepulze Mem

@FSecureLABS
F-Secure LABS FSecureLABS

Basingstoke, Johannesburg, London, Manchester, Singapore, New York