Skip to content
View luca-regne's full-sized avatar
🤯
🤯

Block or report luca-regne

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@justmobilesec
Just Mobile Security justmobilesec
We are a company that focuses on the business of mobile applications, their environment and the information that travels through them.
@TheDauntless
Jeroen Beckers TheDauntless
Mobile Security Expert at @NVISOsecurity

@NVISOsecurity Belgium

@NDevTK
NDevTK NDevTK
Pretending to be a security researcher.
@Ch0pin
+Ch0pin Ch0pin
Security / vulnerability Researcher, Malware Addict

Microsoft /dev/null

@kikfox
kikfox kikfox
Android re-engineering tools thekikfox@gmail.com https://t.me/kikfox
@REAndroid
REAndroid REAndroid
Android re-engineering @kikfox
@qtfreet00
qtfreet00 qtfreet00
Android IOS Security/Reverse Developer

China

@hluwa
葫芦娃 hluwa
端茶送水扫地擦窗浇花喂鱼保洁通马桶拔网线

China, Swatow

@blacktop
blacktop

Nowheresville

@tbodt
tbodt tbodt
I write lines of code that sometimes work and sometimes fail spectacularly. It's more fun when they fail spectacularly.

@google

@Lissy93
Alicia Sykes Lissy93
Turning caffeine into code 🥤

London, UK

@Tricta
Tricta Tricta

Brasil, São Paulo

@willienel
Willie Nel willienel
Security Engineer | Ethical Hacker | DevSecOps Practitioner

Nedap Healthcare Netherlands

@lautarovculic
Lautaro Villarreal Culic' lautarovculic
Mobile Security Researcher

Argentina

@ReversecLabs
Reversec Labs ReversecLabs
Research and development output from Reversec's consultants

Sweden

@Yogehi
Ken Gannon / 伊藤 剣 Yogehi
Gamer with a Security Researcher problem

@NCCGroup New York, NY

@muellerberndt
Bernhard Mueller muellerberndt
Uncertified hacker | P(G(F)) = ∀y q(y, G(F))
@pimterry
Tim Perry pimterry
Creator of @httptoolkit: Powerful tools to debug, test & build with HTTP(S). Node.js core collaborator, and maintainer of Loglevel, notes, & Mockttp

@httptoolkit Barcelona, Spain

@diofeher
Diógenes Fernandes diofeher
@opentofu's maintainer

João Pessoa - PB

@HakuPiku
Eldar HakuPiku
Cybersecurity Researcher. Ex-developer. Bug bounty hunter. CTF player for Kalmarunionen.

Sweden

@PixelOS-AOSP
PixelOS PixelOS-AOSP
An AOSP based ROM aiming to provide the best of Pixel

India

@ProjectBlaze
ProjectBlaze ProjectBlaze
"Enhanced Android experience with customizable features, optimized performance, and security."

India

@oleavr
Ole André Vadla Ravnås oleavr

@nowsecure Stavanger, Norway

@objective-see
Objective-See Foundation objective-see

Objective-See Foundation Hawaii, USA

@Pilfer
Pilfer
RE. Security. Music. Automation. For educational purposes only.
@hextreeio
hextree.io hextreeio
Grow your cybersecurity skills

Germany

@vaib25vicky
v1c7 vaib25vicky

New Delhi, India

@oliviagallucci
Olivia Gallucci oliviagallucci
macOS internals  | watchOS enthusiast | Free(dom) and open source advocate. Personal account.

Datadog USA

@rcvalle
Ramon de C Valle rcvalle
Vulnerability researcher at @google.

@Google Santa Clara, CA

@attacksurge
AttackSurge attacksurge
Unleashing Distributed Scanning for Everyone
@sketler
Edward Amaral Toledano sketler
Hey there, I'm Edward, a Computer enthusiast normally trying to find company's vulnerabilities

@oplium