8000 Nariod / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View Nariod's full-sized avatar
😱
La troisième va vous surprendre
😱
La troisième va vous surprendre

Block or report Nariod

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@mainframed
Soldier of FORTRAN mainframed
Mainframe hacker extraordinaire

Level 6 Security Cyberspace

@hdbreaker
Alejandro Parodi hdbreaker
Security Researcher, Malware enthusiast.
@Whitecat18
Smukx ♠ Whitecat18
Offensive code writer. 20 y/o.

0.0.0.0 127.0.0.1

@ggerganov
Georgi Gerganov ggerganov
I like big .vimrc and I cannot lie

@ggml-org Sofia, Bulgaria

@RalfHacker
Ralf RalfHacker
Pentest, Red Team, MalDev
@JanielDary
Daniel Jary JanielDary
Security Researcher

UK

@safedv
safe safedv
Red Team Operator

0.0.0.0

@zimmski
Markus Zimmermann zimmski
Autonomously Generating Your Unit Tests as Managing Director / CTO / Founder at Symflower Hopefully going to having more time for open source projects again.

Symflower Austria

@DanMcInerney
Dan McInerney DanMcInerney
Lead AI Security Researcher at Protect AI

@danhmcinerney

@infosec-au
Shubs infosec-au
halcyon

Assetnote Australia

@JosepSampe
Josep Sampé JosepSampe
PhD in Computer Engineering. Researcher interested in distributed systems, cloud computing, data analytics and software engineering.

Barcelona

@Ge0rg3
George O Ge0rg3

United Kingdom

@yogeshojha
Yogesh Ojha yogeshojha
Research Engineer @ TRG building solutions for Crime and Terror Builds and maintains reNgine

TRG Research and Development

@3lp4tr0n
elp4tr0n 3lp4tr0n
Offensive Security
@t94j0
Max Harley t94j0
'Wonderful', the Flatline said, 'I never did like to do anything simple when I could do it ass-backwards.' ―Neuromancer

@ireallydontcare Charleston, SC

@0xb11a1
Bilal 0xb11a1
Writing buggy code
@pathtofile
pat_h/to/file pathtofile
path@tofile.dev

Australia

@lefayjey
Joe Farjallah lefayjey
Penetration Tester, Red-Purple Teamer, Ethical Hacker | OSCP, OSWE, OSEP, RTO, RTL, CARTP, ECIHv2
@Hackndo
Pixis Hackndo
Security blog author https://hackndo.com

Login Sécurité Paris

@tsale
Kostas tsale
Coding mostly for threat hunting, threat intelligence, and detection engineering.

Mars

@xct
xct xct
Hobby ⚑ Collector

Berlin | Tokyo

@OlivierLaflamme
Boschko OlivierLaflamme
Just a french canadien who likes computers.

HiddenLayer Toronto Canada

@SpecterOps
SpecterOps SpecterOps

United States of America

@xme
Xavier Mertens xme
Freelance Security Consultant, SANS ISC Handler, SANS FOR610 Instructor, Blueteamer, Hunter, Blogger.

Xameco Belgium

@S4ntiagoP
Santi S4ntiagoP
🇦🇷

MDSec Metaverse

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@nnmkhang
Khang nnmkhang
Software Engineer @ Microsoft
@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@Sh3lldon
Shelldon Sh3lldon
Adversary Simulation & Malware Development | OSED | OSEP | CRTO | CRTE | CRTM certified

Kazakhstan

@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@hakaioffsec
Hakai Security hakaioffsec
We discover security flaws that your team would never have thought of.

Brazil

0