Skip to content
View thejanit0r's full-sized avatar

Block or report thejanit0r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@backengineering
Back Engineering Labs backengineering
A small research team with big dreams.

United States of America

@connormcgarr
Connor McGarr connormcgarr

United States of America

@eversinc33
eversinc33 eversinc33

Check Point Research Vienna

@binref
Team Binary Refinery binref
On a Mission to Refine Binaries
@Wenzel
Mathieu Tarral Wenzel
Security Researcher | Virtual Machine Introspection & Fuzzing

@intel Paris, France

@stevemk14ebr
Stephen Eckels stevemk14ebr
I do security work and build things for fun.

0177.0x001:80

@daaximus
daax daaximus
technical research
@memN0ps
memN0ps

New Zealand

@torvalds
Linus Torvalds torvalds

Linux Foundation Portland, OR

@ataradov
Alex Taradov ataradov

Colorado Springs, CO

@0xeb
Elias Bachaalany 0xeb
** YouTuber ** Author: Batchography ** Co-author: Practical Reverse Engineering & Antivirus Hacker's Handbook.
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@corkamig
Ange Albertini corkamig
Security Engineer

Google

@hugsy
crazy hugsy hugsy
Exploit Dev & OffSec Tool Dev

@blahcat Ring0

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@DebugPrivilege
DebugPrivilege DebugPrivilege
Security Person with interest in troubleshooting problems on Windows.
@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@matrosov
Alex Matrosov matrosov
IDAholic, #CodeXplorer, @REhints , "Rootkits and Bootkits" book co-author (http://bootkits.io), Firmware voodoo, and TEE exorcist.

BINARLY Los Angeles CA

@williballenthin
Willi Ballenthin williballenthin
/usr/bin/nethack

@HexRaysSA

@gtworek
Grzegorz Tworek gtworek
https://linkedin.com/in/grzegorztworek
@trufae
pancake trufae

NowSecure Internet

@snovvcrash
snovvcrash snovvcrash
Sr. Penetration Tester / Red Team Operator, author of the Pentester’s Promiscuous Notebook

(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@therealdreg
Dreg therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher

rootkit.es Spain

@panda-re
PANDA panda-re
PANDA: Platform for Architecture-Neutral Dynamic Analysis

United States of America

@unicorn-engine
Unicorn Engine unicorn-engine
Multi-arch multi-platform CPU emulator framework
@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@strazzere
Tim Strazzere strazzere
Everything can be reversed

Red Naga California