8000 dword64 (dword64) / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View dword64's full-sized avatar
:shipit:
:shipit:

Highlights

  • Pro

Block or report dword64

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@vtil-project
VTIL Project vtil-project
VTIL (Virtual-machine Translation Intermediate Language) Project is a set of tools that can be used for binary deobfuscation and devirtualization.
@HexRaysSA
Hex-Rays SA HexRaysSA
Hex-Rays - State of the art binary code analysis tools
@x86byte
x86byte x86byte
Low-Level Security Enthusiast [iOS & Windows Vulnerability Researcher & Exploit Developer] 👾🥤

securekernel.exe

@backengineering
Back Engineering Labs backengineering
A small research team with big dreams.

United States of America

@es3n1n
Arsenii es3n1n es3n1n
my therapist told me that this is a great place to make new friends

not_es3n1n on discord

@CR3Swapper
IDontCode CR3Swapper
While you sleep we work

Back Engineering Labs

@ergrelet
Erwan Grelet ergrelet
Fond of reverse engineering and software development. Doing security engineering at some company.

Montreal, QC

@electronicarts
Electronic Arts electronicarts
Electronic Arts, inspiring a global community of players to explore new ways to play every day

Worldwide

@ioncodes
Layle ioncodes
part time stack frame counterfeiter

0x41414141

@ZehMatt
Matt ZehMatt
Software Engineer/Bug destroyer

GN-z11

@vmctx
feli vmctx
meoww mrrrp
@revng
rev.ng revng
We're building the next generation decompiler. Binary analysis is a dish best served static.
@ekknod
ekknod ekknod
Anti-Cheat developer for ekknod.xyz

ekknod.xyz Finland

@brymko
brymko
Hacker, Vulnerbility Research & Exploit Dev, Hobby stock market quant

Singapore

@zer0condition
zer0condition
Kernel / Hypervisor / Security Researcher
@harlamism
Sergejs Harlamovs harlamism
kaREte and kung-RE practitioner

IKARUS Security Software GmbH Vienna, Austria

@xtremegamer1
sussy baka xtremegamer1
Owner of the world's longest monero vanity address (14 9's): 4AbLLLZvjdA3cXr8Xs2LevhActZt3TLGhjiVga99999999999999fvdWrvvfpRHSS78hRznFjpb64BKnn12H5bQFAsifLdj
@Lima-X
Lima X Lima-X
Low level hobby dev | C/C++, x86asm and .Net | mostly making random stuff cause idk

Technical University of Darmstadt Germany

@not-matthias
Matthias not-matthias
not-matthias#1403

Founding Systems Engineer @codspeedhq Netherlands

@HX73D
HX73D HX73D
Discord: HX73D

Netherlands

@daaximus
daax daaximus
technical research
@vmcall
vmcall

@thesecretclub

@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@0AVX
0AVX
I’m a developer who is passionate about software development, software security, and reverse engineering.
@symengine
symengine
SymEngine is a fast symbolic manipulation library, written in C++
@joyboyy29
Joy Boy joyboyy29
Avid learner and dreaming to be the best reverse engineer.

0xC1A551F1ED

@54
dinero 54
Tell us a little bit about yourself

USA

@donnaskiez
donnaskiez

Sydney, Australia

@RiotVanguard
Riot Vanguard RiotVanguard
Sentient Anti-Cheat of @RiotGames

Riot Games Santa Monica, CA

@ByteWhite1x1
White Byte ByteWhite1x1
None of your business.

Finland

@the-hideout
The Hideout the-hideout
The ultimate ecosystem for all your Tarkov needs
0