Skip to content
View krakankrakan's full-sized avatar
👀
Reversing Stuff
👀
Reversing Stuff

Block or report krakankrakan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@apple-oss-distributions
Apple OSS Distributions apple-oss-distributions
OSS Code distributed by Apple, Inc.

United States of America

@f0rki
Michael Rodler f0rki
AppSec Consultant and Researcher. I like fuzzers, compilers, binaries, and most of all finding bugs. Currently doing so for @cologneintelligence

Cologne, Germany

@bazad
Brandon Azad bazad
iOS security research

Google Project Zero

@ant4g0nist
Chaitanya ant4g0nist
Founder & CEO @ Yokai Network || Vulnerability Researcher || 🦀

Yokai Network Amsterdam

@HexHive
HexHive HexHive
Enforcing memory safety guarantees and type safety guarantees at the compiler and runtime level

Switzerland

@SouhailHammou
Souhail Hammou SouhailHammou
Reverse engineering, Malware analysis, Windows Internals, and Vulnerability Research.

Casablanca, Morocco

@tchebb
Tom Hebb tchebb
Security engineer. Interested in low-level programming, embedded systems hacking, and reverse engineering.
@newaetech
NewAE Technology Inc. newaetech
NewAE Technology Inc. is the embedded security arsonist.
@Cryptogenic
Specter Cryptogenic
Security researcher.
@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@R0rt1z2
Roger Ortiz R0rt1z2
I like to break bootloaders

Barcelona, Spain

@Zenofex
Amir Etemadieh Zenofex
Security Researcher, PCB Designer, Founder of Exploitee.rs and Founder of Pastecry.pt.

@exploiteers Austin, TX

@ioncodes
Layle ioncodes
part time stack frame counterfeiter

0x41414141

@acidicoala
acidicoala

Eucalyptus tree

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@ayoubfaouzi
Ayoub Faouzi ayoubfaouzi
Reverse engineering, windows internals, and hypervisors.
@fasferraz
Fabricio fasferraz
Working in Mobile Core engineering since 1999. Not a professional programmer!
@progmboy
progmboy
zhai zhai zhai
@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@SySS-Research
SySS Research SySS-Research
Open source IT security software tools and information

Tübingen, Germany

@ultraembedded
ultraembedded
CPU designs, digital HW IP, emulation and embedded system projects

UK

@Naville
Zhang Naville
SMT / SAT, Math, Compiler & Kernel Infrastructure.

miHoYo / HoYoverse / COGNOSPHERE lib/Analysis

@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@bkerler
Bjoern Kerler bkerler
3D printing and iot firmware developer

@revskills@infosec.exchange Europe

@NeatMonster
Alex A. NeatMonster
well now I am not doing it

@Impalabs Toulouse, France

@wbenny
Petr Beneš wbenny

Brno, Czech Republic

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@saaramar
Saar Amar saaramar
Reversing, exploits, {Windows, Hyper-V, iOS} internals, mitigations.
@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France