Skip to content
View p0dalirius's full-sized avatar
🦋
🦋

Sponsors

@mxrch
@Zamanry
Private Sponsor

Highlights

  • Pro

Block or report p0dalirius

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@Nightmare-Eclipse
Nightmare Eclipse Nightmare-Eclipse
Microsoft's nightmare.

Microsoft Redmond

@Aituglo
Aituglo - Cassim Aituglo
Bug Hunter at HackerOne and YesWeHack • Digital Nomad

404 Not Found

@0xbbuddha
bbuddha 0xbbuddha
90% coffee, 10% exploits.

Aukfood France

@LaurieWired
LaurieWired
serial complexity unpacker
@jazofra
Javier Azofra jazofra
With over seven years of experience in Cybersecurity, I lead a team at Siemens Healthineers focused on continuous threat assessment.
@GrapheneOS
GrapheneOS GrapheneOS
Security and privacy focused mobile OS with Android app compatibility. We focus on developing substantial privacy and security improvements.

Toronto, Ontario, Canada

@aperezbios
Alex Perez aperezbios

Rabbit Hole Computing Northern California

@5250ng
5250ng 5250ng
The new generation 5250 terminal emulator

United States of America

@ufrisk
Ulf Frisk ufrisk
IT-Security Minion

Sweden

@jaredcatkinson
Jared Atkinson jaredcatkinson

SpecterOps Las Vegas, NV

@garrettfoster13
unsigned_sh0rt garrettfoster13
Security Researcher at @SpecterOps

SpecterOps

@MichaelGrafnetter
Michael Grafnetter MichaelGrafnetter
Principal Security Researcher @SpecterOps, Microsoft MVP Identity & Access

@SpecterOps Prague, Czech Republic

@n00py
n00py n00py
I look at packets.

@trustedsec Denver

@Dfte
Deft_ Dfte
I hate not understanding precisely how things work.
@exploide
Jannik Vieten exploide
IT Security guy, open-source enthusiast, likes to keep things simple, <3 Python

Germany

@TheManticoreProject
The Manticore Project TheManticoreProject
Crowdsourced open source offensive and defensive security tools, to heighten the security posture of the community as a whole

France

@NtAlexio2
Packet Phantom NtAlexio2
🛠️Offensive security developer crafting tools for pentesters.🕵️‍♂️Living in Wireshark since 2016.🔄I break protocols, fix them, then break them again for fun!

Somewhere between packets

@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@Trimarc
Trimarc Trimarc
Securing the Enterprise

United States of America

@JimSycurity
Jim Sykora JimSycurity
I do Active Directory & Identity security stuff for a living.
@BloodHoundAD
BloodHound Legacy Account (Deprecated) BloodHoundAD
Deprecated GitHub account for BloodHound Legacy (v4 - outdated) and other older repositories. Please use SpecterOps GitHub account and its repos going forward.

United States of America

@Mayyhem
Chris Thompson Mayyhem
Senior Security Researcher @ SpecterOps

@SpecterOps

@hotnops
Daniel Heinsen hotnops
software engineer / optimist / does things @SpecterOps

@SpecterOps

@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@leechristensen
Lee Chagolla-Christensen leechristensen
I like to make computers misbehave

SpecterOps Seattle

@GhostPack
GhostPack GhostPack
A collection of security related toolsets.
@hippiiee
Hippie hippiiee
Web security, OSINT, SE, Lockpick, Car hacking 👾

@Rhackgondins

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@mubix
Rob Fuller mubix
Certified Checkbox Unchecker

@NoVAHackers Internets