Skip to content
View spd-000's full-sized avatar

Block or report spd-000

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@thomasxm
Thomas M thomasxm
25519

United Kingdom

@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Earth

@3lp4tr0n
elp4tr0n 3lp4tr0n
Offensive Security
@cpu0x00
cpu0x00
the mocking bird
@y11en
y11en y11en
1F Y0U CAN'7 H0DL, Y0U W1LL N0T 8E P00R

@y11en

@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@S4ntiagoP
Santi S4ntiagoP
🇦🇷

MDSec Metaverse

@icyguider
icyguider icyguider
It's sipple out there!
@EvilBytecode
EvilBytecode
For educational purposes only. Explicit authorization required. No warranties. Author disclaims all responsibility for unauthorized use.

TM. Codepulze Mem

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@fortra
Fortra fortra
Your cybersecurity ally.

United States of America

@CodeXTF2
CodeX CodeXTF2
Red teamer and offensive dev. I pop shells and play tf2.

in your walls userland

@nmatt0
Matt Brown nmatt0
Hardware Hacker - I run arch btw - Soli Deo Gloria

/dev/ttys0

@Wh04m1001
Filip Dragović Wh04m1001
OSCP,OSEP,CRTO,CRTP,CRTE,PACES
@angea
Ange Albertini angea
Reverse engineer, author of Corkami
@nickvourd
Nikos Vourdas nickvourd
Just your friendly neighborhood APT:~# OSCE3 | OSCP | OSWP | CRTL | CRTO | OASP

Evil Corp Ltd. Chicago, IL, USA

@GeorgePatsias
UserX GeorgePatsias
Breaking stuff until they work (̿▀̿ ̿Ĺ̯̿̿▀̿ ̿)̄ Offensive Security Engineer | OSEP | Computer Scientist | Pentester | Malware Developer | Fullstack Dev

Kernel

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland