Skip to content
View thejanit0r's full-sized avatar

Block or report thejanit0r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@DownWithUp
Michael B. DownWithUp
Security researcher. Interested in low-level technologies.

Internet

@WithSecureLabs
WithSecure Labs WithSecureLabs
Welcome to WithSecure Labs. Here we publish research, and share our tools with the security community.
@rung
Hiroki Suezawa rung
Security Engineer

Tokyo,Japan

@arnaugamez
Arnau arnaugamez
Hacker, security researcher and mathematician.
@ntddk
Yuma Kurogome ntddk
ᵖˢᵉᵘᵈᵒ⁻ˢᶜᶦᵉⁿᶜᵉ ᵃⁿᵈ ᶠˡʸᶦⁿᵍ ᵖᶦᵍˢ.

Tokyo, Japan

@bluesadi
Yibo Liu bluesadi
Reverse Engineering | Binary Analysis | PhD student @sefcom

Tempe, AZ

@Print3M
Print3M
Red Team operator & security research & programming.
@PELock
Bartosz Wójcik PELock
Software anti-crack protection & licensing solutions for developers, advanced reverse engineering services, source code recovery, image recognition (AZTEC 2D).

PELock

@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@zer0condition
Wezo zer0condition
school is tiring
@doronz88
doronz88
Software researcher
@milankovo
milankovo
IDA fanboy
@micREsoft
MicREsoft micREsoft
micREsoft: Dedicated to Windows reverse engineering!
@jonpalmisc
Jon Palmisciano jonpalmisc
iOS exploits, (de)compilers, etc.

0x180380000

@gaasedelen
gaasedelen
turning over rocks and finding nothing is still progress.
@triskellib
Triskel triskellib
Graphing library for Control Flow Graphs

France

@RobinDavid
Robin David RobinDavid
Software Security Researcher working on reverse-engineering, software analysis, symbolic execution, fuzzing. Also attacking obfuscation as a hobby.

Quarkslab Paris, France

@x64dbg
x64dbg x64dbg
An open-source x64/x32 debugger for windows.
@Fare9
Fare9 Fare9
Malware analyst, reverser and python, asm, C, C++ developer.
@blacktop
blacktop

Nowheresville

@HyperDbg
HyperDbg HyperDbg
Hardware & Software Debugging, Analyzing, and Reverse Engineering Infrastructures
@SychicBoy
SychicBoy [CS-RET] SychicBoy
.NET Developer & Reverse Engineer.

CodeStrikers [CS-RET]

@rust-adventure
Rust Adventure rust-adventure
Learn to build reliable and efficient software with Rust
@danielplohmann
Daniel Plohmann danielplohmann
Malware Researcher. Working for Fraunhofer @fkie.
@DissectMalware
Malwrologist DissectMalware
A senior security engineer who loves contributing to the cybersecurity community by developing open source tools to help security analysts to achieve more

Amazon

@redthing1
red thing redthing1
cryptography / security / research

the eternal wonders of space California

@rust-embedded-community
Rust Embedded Community rust-embedded-community
A collection of Rust Embedded projects which were in need of a home
@GrapheneOS
GrapheneOS GrapheneOS
Security and privacy focused mobile OS with Android app compatibility. We focus on developing substantial privacy and security improvements.

Toronto, Ontario, Canada

@vxcall
shu vxcall
Prove em wrong