Skip to content
View thejanit0r's full-sized avatar

Block or report thejanit0r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@triskellib
Triskel triskellib
Graphing library for Control Flow Graphs

France

@RobinDavid
Robin David RobinDavid
Software Security Researcher working on reverse-engineering, software analysis, symbolic execution, fuzzing. Also attacking obfuscation as a hobby.

Quarkslab Paris, France

@x64dbg
x64dbg x64dbg
An open-source x64/x32 debugger for windows.
@Fare9
Fare9 Fare9
Malware analyst, reverser and python, asm, C, C++ developer.
@blacktop
blacktop

Nowheresville

@HyperDbg
HyperDbg HyperDbg
Hardware & Software Debugging, Analyzing, and Reverse Engineering Infrastructures
@CR3Swapper
IDontCode CR3Swapper
While you sleep we work

Back Engineering Labs, Inc

@SychicBoy
SychicBoy [CS-RET] SychicBoy
.NET Developer & Reverse Engineer.

CodeStrikers [CS-RET]

@rust-adventure
Rust Adventure rust-adventure
Learn to build reliable and efficient software with Rust
@danielplohmann
Daniel Plohmann danielplohmann
Malware Researcher. Working for Fraunhofer @fkie.
@DissectMalware
Malwrologist DissectMalware
A senior security engineer who loves contributing to the cybersecurity community by developing open source tools to help security analysts to achieve more

Amazon

@redthing1
red thing redthing1
cryptographer. also a researcher/engineer

the eternal wonders of space California

@rust-embedded-community
Rust Embedded Community rust-embedded-community
A collection of Rust Embedded projects which were in need of a home
@GrapheneOS
GrapheneOS GrapheneOS
Security and privacy focused mobile OS with Android app compatibility. We focus on developing substantial privacy and security improvements.

Toronto, Ontario, Canada

@sh4m2hwz
Artem Nechaev sh4m2hwz
“People must communicate. They will make mistakes, and we will exploit them.”–James Clapper, DNI
@0xTriboulet
Steve S. 0xTriboulet
Allegedly some kind of researcher
@es3n1n
Arsenii es3n1n es3n1n
extremely bad at everything i do

not_es3n1n on discord

@oct0xor
Boris Larin oct0xor
Playing video game consoles since 1991 Hacking video game consoles since 2010 Hunting in-the-wild 0-days since 2017
@N0fix
Nofix N0fix

https://gitlab.com/Nofix

@a13xp0p0v
Alexander Popov a13xp0p0v
Linux Kernel Developer & Security Researcher. This is my personal account.
@x86byte
x86byte x86byte
iOS & Windows Vulnerability Researcher & Exploit Developer — Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend 👾🥤

@OrcaCyberWeapons securekernel.exe

@gdbinit
fG! gdbinit
I like debuggers, disassemblers, and C (and some Go)!

Put.as Portugal

@stong
cts stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue. Previously @Vector35, @sslab-gatech.

@Zellic 0x4141414141414141

@herrcore
herrcore herrcore

OpenAnalysis Inc

@alexandreborges
Alexandre Borges alexandreborges
Vulnerability Researcher | Exploit Developer
@morsisko
Michael morsisko
Just checking how things work

Poland

@HexRaysSA
Hex-Rays SA HexRaysSA
Hex-Rays - State of the art binary code analysis tools
@extremecoders-re
extremecoders-re
Security Researcher

Sol III

@mahaloz
Zion Leonahenahe Basque mahaloz
Native Hawaiian | PhD Student @sefcom in Comp Sci | Prev Co-captain @shellphish | Decompiler Research

Arizona State University

@QBDI
QBDI QBDI
QuarkslaB Dynamic binary Instrumentation

Quarkslab

@lifting-bits
Lifting Bits lifting-bits
Binary Translation by @trailofbits

New York, NY

@vtil-project
VTIL Project vtil-project
VTIL (Virtual-machine Translation Intermediate Language) Project is a set of tools that can be used for binary deobfuscation and devirtualization.
@psifertex
Jordan psifertex

@Vector35 Melbourne, FL

@ioncodes
Layle ioncodes
part time stack frame counterfeiter

0x41414141