8000 Sh3lldon (Shelldon) / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View Sh3lldon's full-sized avatar
💢
Focusing
💢
Focusing

Block or report Sh3lldon

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@mannyfred
mannyfreddy mannyfred
Retard with a compiler

Estonia

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@Mardcelo
Mard Mardcelo
That Half-Drunk Security Researcher 🍺

MardLab South Korea

@fortra
Fortra fortra
Your cybersecurity ally.

United States of America

@nikosecurity
Niko nikosecurity
OneShot Niko Turned Windows Exploit Developer
@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@Lavender-exe
Lav Lavender-exe
Pentester & Cyber Nerd
@Cryakl
Cryakl Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.

Lawliet

@six2dez
six2dez six2dez
Ethical hacker, bash lover, foss rulz!

Spain

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻

@Yeeb1
Yeeb Yeeb1
Penetration tester, red teamer and capture the flag player with incident response experience.
@xct
xct xct
Hobby ⚑ Collector

Berlin | Tokyo

@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@timip
tiptiptip timip
Security and Splunk enthusiast

Timlab Hong Kong / San Francisco

@NUL0x4C
NULL NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
@Maldev-Academy
Maldev Academy Maldev-Academy
A comprehensive module-based malware development course providing fundamental to advanced level knowledge
@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@alisaesage
Alisa alisaesage
Excellence is what mediocrity fears most

independent hyperspace

@xrombar
bakki xrombar
public git for resume purposes
@nop-tech
nop nop-tech
IT-Security Student | OSCP & OSED certified
@Mardce1o
Mardcelo Kim Mardce1o
「知彼知己,百戰不殆;不知彼而知己,一勝一負;不知彼,不知己,每戰必殆」

Nowhere

@bmdyy
William Moody bmdyy
Cybersecurity consultant

Vienna, Austria

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@plackyhacker
John Tear plackyhacker
I am me... just an amateur malware developer. If you use my code, don't be naughty, keep it legal!!!
@offensive-security
Offsec offensive-security

OffSec Services Limited

@w4fz5uck5
Alexa Souza w4fz5uck5
Co-Founder & CTO at ViperX | Speaker at H2HC & BHACK | OSCP¹⁸ʸ | OSCE¹⁹ʸ | OSWE²¹ʸ | OSWP | 🏳️‍⚧️

https://viperx.io MOV AL, 0x11

@abatchy17
Mohamed Shahat abatchy17
Security researcher

Vancouver, BC

@tr3sp4ss3rexe
tr3sp4ss3rexe
BSc in Software Engineering (In progress)

Blekinge Institute of Technology Ring 0

@affix
Keiran Smith affix
Penetration Tester and Developer from Scotland

@nable-org Scotland

@connormcgarr
Connor McGarr connormcgarr
OSCP, OSCE, OSEE | Exploit Development, Vulnerability Research, and Red Teaming.

United States of America

0