Users following lifting-bits
agnosticlines
reverse engineering, program analysis and exploit dev |
i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects
[object Object] /dev/kmem
modulexcite
Just Code It!
SSBMb3ZlIEh1bnRpbmcvRmluZGluZyB0aGluZ3MgYW5kIHdvdWxkbid0IGJlIHBvc3NpYmxlIHdpdGhvdXQgdGhlIGhlbHAgZnJvbSBhbGwgdGhlIGFtYXppbmcgT1NTIGNvbnRyaWJ1dG9y
HAHA168
coderup2u
Beginner Software & Reverse Engineer | Always Learning in C、C++、Python、GO、Rust、ASM、Java & AI
x86byte
x86byte
iOS & Windows Vulnerability Researcher & Exploit Developer — Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend 👾🥤
@OrcaCyberWeapons securekernel.exe
Ioannis Gardikiotis
k3rneluser
I'm into software/system security(pwn,reverse) and vulnerability/security research.
gkgoat
gkgoat1
I make everything. Also check out my corporate profile, @portal-co
Matrix: @gkgoat:matrix.org
@portal-co
Clif Wolfe
flounderK
aka grepwithextrasteps.
Source control is just a myth.
I play CTF.
https://gitlab.com/wolfeco
Good god I’m lost
Alex
M0nteCarl0
Embedded programmer | HW & Network security enthusiast | Hobby reverse engineer
@NemezidaSecurityBand @fincubator Error: Unable to resolve
Franck FERMAN
franckferman
Per aspera ad root ⠵
🛡️ Cybersecurity Professional | Offensive & Defensive Security
📌 Pentest | SOC | Malware Development
⚡ Open-source Contributor
Paris, France
PreviousNext