Skip to content
View lars312's full-sized avatar

Block or report lars312

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@gelim
Mathieu Geli gelim
Insecurity researcher

@AmadeusITGroup Nice

@shipcod3
Jay Turla shipcod3
security researcher and appsec professional

VicOne Philippines

@Dfte
Deft_ Dfte
I hate not understanding precisely how things work.
@sensepost
SensePost sensepost
Orange Cyberdefense's Ethical Hacking Team

The World

@karpathy
Andrej karpathy
I like to train Deep Neural Nets on large datasets.

Stanford

@steipete
Peter Steinberger steipete
Came back from retirement to mess with AI. Clawdfather @openclaw Previously: Founder of @PSPDFKit.

Full-Time Open-Sourcerer Vienna & London

@hausec
Ryan Hausknecht hausec
script kiddie extraordinaire

@haus3c

@ehsandeep
Sandeep Singh ehsandeep
Co-Founder / CTO @projectdiscovery On a mission to simplify the security process and make it more accessible.

@projectdiscovery India

@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@t3l3machus
Panagiotis Chartas t3l3machus
Penetration Tester, Cybersecurity Researcher.
@lkarlslund
Lars Karlslund lkarlslund
Curious Security Minded Octopus, freelance security consultant, loves Active Directory, finding holes in the cheese, coding Golang, ntlm.pw

NetSection Security Denmark

@byt3bl33d3r
Marcello byt3bl33d3r
T H I C C M A L W A R E

Palo Alto Networks Error: Unable to resolve

@nighthawkc2
Nighthawk C2 nighthawkc2
Nighthawk, an advanced command-and-control framework for red teams

United Kingdom

@lefayjey
Joe Farjallah lefayjey
Penetration Tester, Red-Purple Teamer, Ethical Hacker | OSCP, OSWE, OSEP, RTO, RTL, CARTP, ECIHv2
@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@GTFOBins
GTFOBins
GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.
@praetorian-inc
Praetorian praetorian-inc
Praetorian provides a suite of security solutions that enable clients to solve cybersecurity problems across their enterprise and product portfolios.

US (Austin, TX)

@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.
@leechristensen
Lee Chagolla-Christensen leechristensen
I like to make computers misbehave

SpecterOps Seattle

@EmpireProject
EmpireProject
The Empire project is a PowerShell and Python post-exploitation agent.
@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
@blacklanternsecurity
Black Lantern Security blacklanternsecurity
Security Organization

Charleston, SC

@fortra
Fortra fortra
Your cybersecurity ally.

United States of America

@SpecterOps
SpecterOps SpecterOps

United States of America

@rvazarkar
Rohan Vazarkar rvazarkar
BloodHound Developer and Penetration Tester

SpecterOps

@SafeBreach-Labs
SafeBreach Labs SafeBreach-Labs
SafeBreach Labs

Worldwide