Skip to content
View eversinc33's full-sized avatar
🗝️
🗝️

Block or report eversinc33

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@VollRagm
VollRagm VollRagm
Discord: vollragm
@Cyber0P
Cyber Cyber0P
Interested in programming and Cyber security
@sevagas
Sio sevagas
I decided to create this Github along by blog to share my experimentations in the information security field.
@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@HackingLZ
LZ HackingLZ
This is not the git account you're looking for...mainly backing up public repos.
@gabriellandau
Gabriel Landau gabriellandau
WinDbg’er at @elastic security

Elastic Maryland

@EgeBalci
Ege Balcı EgeBalci
Security Researcher

PRODAFT Den Haag, Netherlands

@zhuhuibeishadiao
猪会被杀掉 zhuhuibeishadiao
一入逆向深似海,从此孤单一个人。

WenZhou China

@paskalian
Paskalian paskalian
Discord: paskalnt
@connormcgarr
Connor McGarr connormcgarr
OSCP, OSCE, OSEE | Exploit Development, Vulnerability Research, and Red Teaming.

@CrowdStrike United States of America

@rogxo
Rog rogxo
C/C++, Reverse Engineering, Disassembly, Windows/Android Internals & Low-level stuff, Exploitations, Penetration Test and more...

Reverse Engineering Co. Ltd. Metaverse

@therealdreg
Dreg therealdreg
Senior Malware Researcher, OS Internals, C/C++, assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC

rootkit.es Spain

@EvanMcBroom
Evan McBroom EvanMcBroom
OSCE, OSCP

@specterops

@0x44F
0x44F 0x44F
Contact me: jimothyroberts on Discord Please only serious enquiries, thanks.

China

@ekknod
ekknod ekknod
Anti-Cheat developer for ekknod.xyz

ekknod.xyz Finland

@donnaskiez
donnaskiez

Sydney, Australia

@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@Fyyre
Fyyre Fyyre
Old school, expert reverse code engineer.
@iPower
iPower iPower
Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @thesecretclub.

Mom's basement

@zer0condition
zer0condition
Kernel / Hypervisor / Security Researcher
@Zero-Tang
Zero Tang Zero-Tang
MS student graduated from Columbia University. Researcher of VM, OS and computer architecture. Founder of Project NoirVisor.

Shanghai, China

@daaximus
daax daaximus
technical research
@ajkhoury
Aidan Khoury ajkhoury
Security Researcher, Reverse Engineer, Kernel Developer, Hacker

@amzn

@bytecode77
Martin Fischer bytecode77
Software Developer & IT Security Expert

Germany

@zeze-zeze
Zeze zeze-zeze

TeamT5 Taiwan

@D4stiny
Bill Demirkapi D4stiny
Security @ Microsoft. Any work here is my own.

Microsoft

@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@stong
cts stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue. Previously @Vector35, @sslab-gatech.

@Zellic 0x4141414141414141

@MegaManSec
Joshua Rogers MegaManSec

5% in Australia, 95% somewhere in Eastern Europe

@ipSlav
ipSlav
Red team guy interested in researching, analyzing and detecting adversary tradecrafts and techniques.
@casterbyte
Caster casterbyte
Network Security Expert, Alter Ego of Magama Bazarov

@exploit-org

@GH-Rake
Rake GH-Rake
Reverse Engineer & Game Hacker @ GuidedHacking.com

GuidedHacking

@kleiton0x00
kleiton0x00 kleiton0x00
Yet another infosec guy.

Austria

@LaurieWired
LaurieWired
Reverse engineer specializing in cross-platform malware analysis with a focus on mobile threats.
@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Beijing