Skip to content
View shark-asmx's full-sized avatar
:octocat:
:)
:octocat:
:)

Highlights

  • Pro

Block or report shark-asmx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@matrixise
Stéphane Wirtel matrixise
Senior Python Consultant 🐍 | CPython Core Dev | 🤖 Deep Learning student | 📢 Speaker | 🇧🇪 dad 👱‍♀️ 🥋 | @thePsf Fellow | ❤️ distributed systems 🐧 🍎

@MgxIO Belgium

@keowu
João Vitor keowu
Security Researcher | i like All OS Internals, Malware & Reverse Engineering, C++, Intel/ARM Assembly and cool things | Jesus Follower

São Paulo & Shizuoka-Ken

@Cn33liz
Cn33liz Cn33liz

Groningen, the Netherlands

@jiansiting
jiansiting jiansiting
剑思庭

Industrial Control Security Researcher China

@w4fz5uck5
Alexa Souza w4fz5uck5
Co-Founder & CTO at ViperX | Speaker at H2HC & BHACK | OSCP¹⁸ʸ | OSCE¹⁹ʸ | OSWE²¹ʸ | OSWP | 🏳️‍⚧️

https://viperx.io MOV AL, 0x11

@nu11secur1ty
nu11secur1ty nu11secur1ty
Hacker/Reverse Engineer/Red Team Penetration Tester/System Administrator/Linux Architect/IT infrastructure Engineer C, Perl, Python & Bash developer.
@brightprogrammer
Siddharth Mishra brightprogrammer
Security Researcher @sefcom ASU

Arizona State University CPU

@SinaKarvandi
Sina Karvandi SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@lowleveldesign
Sebastian Solnica lowleveldesign
Writing unsafe garbage-collected code.

Poland

@ufrisk
Ulf Frisk ufrisk
IT-Security Minion

Sweden

@mattgodbolt
Matt Godbolt mattgodbolt
Compiler Explorer and jsbeeb creator, ex-Google, ex-games, now trading chap.

@compiler-explorer Chicago, IL

@Washi1337
Washi Washi1337
Hello I am scrub

McMurdo Station, Antarctica

@guidedhacking
GuidedHacking guidedhacking
Reverse Engineering & Game Hacking Tutorials

United States of America

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@badd1e
Alisa badd1e
Excellence is what mediocrity fears most

independent hyperspace

@0xflux
flux 0xflux
Senior Security Research Engineer @elastic. Former Red Team engineer. Passionate about cyber defence, security research, and systems programming.

North West, England

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@JoasASantos
Joas A Santos JoasASantos
Academic and Professional experience in Cyber Security / Red Team Lead / Information Security Researcher.

Brasil

@bagder
Daniel Stenberg bagder
I don't know anything. On team @curl.

@wolfSSL the curl factory, Sweden - close to Nebraska

@torvalds
Linus Torvalds torvalds

Linux Foundation Portland, OR

@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@R3x
Siddharth M R3x
PhD student @ Purdue. Security, CTFs and OpenSource <3

India

@therealdreg
Dreg therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher

rootkit.es Spain

@Nukem9
Nukem Nukem9
C#/C++/Reverse engineering (x86 assembly). Some html and js.

North Carolina

@memN0ps
memN0ps

New Zealand

@0xbigshaq
faulty *ptrrr 0xbigshaq
technologia!! 🫴🏼
@0xdea
raptor 0xdea
Polyglot programmer of weird machines.

@hnsecurity Italy

@joeavanzato
panscan joeavanzato
Security Spaghetti, al dente. DFIR, Detection Engineering, Threat Hunting, etc. Join my Discord for Tool Discussion: https://discord.gg/kEQy82N3uT
@eliben
Eli Bendersky eliben

@google California

@0mWindyBug
Windy Bug 0mWindyBug
Always on a learning curve
@ayyucedemirbas
Ayyuce Demirbas ayyucedemirbas
Computer Science and Engineering PhD Student & Teaching Assistant | Machine Learning & Multi-omics, GSoC 2022 @tensorflow

University of North Texas Deep Space Nine

@ionescu007
Alex Ionescu ionescu007
CTIO at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.windows-internals.com

Winsider Seminars & Solutions Inc.

@leesh3288
Seunghyun Lee leesh3288
Xion

Carnegie Mellon University Pittsburgh, PA

@saaramar
Saar Amar saaramar
Reversing, exploits, {Windows, Hyper-V, iOS} internals, mitigations.
@dsasmblr
Stephen Chapman dsasmblr
Developer. Reverse Engineer. Hacker. YouTuber. Writer. "If you can't be the data, be a pointer to the data." -Unknown

DSASMBLR In a disassembler, probably.