🦊
Catching pokemon
CRTO | Professional Red Team offensive engineer. Passionate about cyber defence, security research, and systems programming.
- North West, England
- fluxsec.red
- @0xfluxsec
RussianPanda
RussianPanda95
Senior Threat Intelligence Researcher | Malware Addict | Threat Hunter
TRAC Labs The United States
charB66
charB66
Purple Teamer passionate about CTI, adversary emulation, and malware development.
Sina Karvandi
SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
Pavel Yosifovich
zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!
Trainsec.net United States
João Vitor Garcia
joao-garcia404
Software Engineer | ReactJS - React Native - Golang
Globres São Paulo - SP
Two Seven One Three
TwoSevenOneT
Security Researcher at https://ZeroSalarium.com || Penetration Tester || Red Teamer || Social Engineering Awareness Trainer
Outflank B.V.
outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response
Amsterdam, Netherlands, EU
RustSec
rustsec
Security advisory database for Rust crates to crates.io. Maintained by the Rust Secure Code WG
trickster0
trickster0
Lead Red Teamer & Malware Dev, Reverse engineering for fun and analyzing Winternals
Greece
Kenny Kerr
kennykerr
Creator of C++/WinRT and Rust for Windows • Engineer on the Windows team at Microsoft • Romans 1:16
Mariusz Banach
mgeeky
🔴 Red Team operator.
👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
Binary-Offensive.com Poland
DebugPrivilege
DebugPrivilege
Security Person with interest in troubleshooting problems on Windows.
PreviousNext