Skip to content
View lif3reb00t's full-sized avatar

Organizations

@Nu11P0int3s

Block or report lif3reb00t

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@A-D-Team
Tencent A&D Team A-D-Team
Tencent A&D Team

China

@0e0w
0e0w
0 error(s),0 warning(s).

2026 Hong Kong

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@Whitecat18
Smukx ♠ Whitecat18
Offensive code writer. 20 y/o.

0.0.0.0 127.0.0.1

@maxDcb
Maxime dcb maxDcb
OSEP | OSED | OSCP | CRTO - Senior Information Security Engineer

France

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My learning platform links: https://truecyber.world https://mr.un1k0d3r.world

TrueCyber Inc.

@Neo-Maoku
毛酷红队 Neo-Maoku
专注于红队实战攻防、二进制攻防、免杀、工具开发等原创内容分享
@su18
素十八 su18
你救赎的人 终将成为你的光

Beijing

@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@momosecurity
MomoSecurity momosecurity
陌陌安全

Beijing, China

@SaadAhla
SaadAhla SaadAhla
Security researcher, malware dev

Morocco

@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Earth

@abc123info
希潭实验室 abc123info
ABC_123,2008年入行网络安全,某部委网络安保工作优秀个人,某部委网络安全防护培训外聘讲师,某市局特聘网络安全专家,某高校外聘讲师,希潭实验室创始人。Struts2检测工具及Weblogic T3/IIOP反序列化工具原创作者,擅长安全咨询、红队攻防、APT技战法分析、代码审计、内网渗透。
@Amulab
御守实验室 Amulab
中安网星御守实验室(Amulab)是隶属于中安网星的纯技术研究团队。主要职能包括横向移动研究、AD域安全研究、Windows安全研究等前瞻攻防技术预研、工具孵化,为产品输出安全能力。

China

@zclaiqcc
zclaiqcc zclaiqcc
INTJ

@Tencent Shenzhen

@dsopas
David Sopas dsopas
/me hacks! the webz

Char49 Portugal

@PINGXcpost
PINGXcpost
destination:涉网犯罪取证,网侦方向
@moonD4rk
Roger moonD4rk
Cybersecurity Engineer and Bug Hunter

Singapore

@offensive-security
Offsec offensive-security

OffSec Services Limited

@Aur0ra-m
Aur0ra Aur0ra-m
Security Researcher&Developer&Penetration Tester

@Alibaba Cloud Hangzhou

@Re1own
Re1own Re1own
Computer Security

George Mason University

@NationalSecurityAgency
National Security Agency NationalSecurityAgency
Official organization account for the National Security Agency (NSA)

United States

@H4lo
H4lo
IoT Security Researcher/Reverse engineer/IoT hacker/Bounty hunter

Hangzhou. China

@Silentsoul04
Silentsoul04
Set your heart ablaze.
@kelwin
Kun Yang kelwin

Chaitin Tech Beijing, China

@evilashz
evilash evilashz
Offensive Security Research
@coffeehb
Komi coffeehb
代码就在眼前,我却不识漏洞。

Cheng Du

@W01fh4cker
W01fh4cker W01fh4cker
Doubt is the key to knowledge.
@evilcos
evilcos evilcos
//:ALERT(/HACKING SYMBOL/)//余弦,慢雾(@slowmist),慢而有为,雾释冰融

xeyeteam

@VillanCh
v1ll4n VillanCh
Yak Project Maintianer

yaklang.io Chengdu

@iSafeBlue
浅蓝 iSafeBlue
浅蓝 b1u3r , Security Researcher , Java Development Engineer
@5z1punch
RonnyX 5z1punch
If it's our time to die, it's our time.
@FunnyWolf
rootkit FunnyWolf
Make Hacking Easier

Philips China

@voidfyoo
Voidfyoo voidfyoo
Just a learner.
@tencentbladeteam
Tencent Blade Team tencentbladeteam
A security research team from Tencent Security Platform Department.

Tencent shenzhen

@bats3c
batsec bats3c

@MDSecactivebreach UK

@giantbranch
giantbranch giantbranch
continue to challenge what I want

security company Beijing,China

@uknowsec
Uknow uknowsec
不忘初心,方得始终

Shanghai

@TryGOTry
Try TryGOTry
一个搞安全的菜鸡脚本小子罢了。

tryblog@t00ls.net

@MountCloud
MountCloud
Sharing makes people progress. mountcloud@outlook.com.

MountCloud

@L-codes
L L-codes
One who wants to wear the crown, Bears the crown
@connormcgarr
Connor McGarr connormcgarr

United States of America