Skip to content
View 1rm's full-sized avatar
👻
Out sick
👻
Out sick
Block or Report

Block or report 1rm

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@nick-frischkorn
Nick Frischkorn nick-frischkorn
OffSec | Rutgers 20'

Brickell, Miami FL

@secretsquirrel
midnite_runr secretsquirrel
I laugh in the general direction of security products.
@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@Syntax-Err0r
Syntax-Err0r
https://twitter.com/err0r_syntax
@ProcessusT
Processus ProcessusT
Ingénieur sécurité & Microsoft Security MVP 💻 CEH | OSCP | RTO | CRTE | PNPT | Speaker @LeHack

Les tutos de Processus Reims, France

@ambionics
Ambionics Security ambionics
Offensive & Continuous Web Security Assessment
@Offensive-Panda
Usman Sikander Offensive-Panda
An infosec guy who's constantly seeking for knowledge.

Personal Mars

@es3n1n
Arsenii es3n1n es3n1n
familiar with asm/c/cxx/csharp/py3 ~ reverse engineering ~ windows kernel ~ web development ~ CTFs with @cr3mov ~ and some other boring stuff

hire me please not_es3n1n on discord

@BlackSnufkin
BlackSnufkin
Red Team | Malware Dev
@Meowmycks
Meowmycks
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ zzz... ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ /ᐠ_ ꞈ _ᐟ\___ノ
@DosX-dev
DosX DosX-dev
If bugs are the engine of progress, then I'm a very progressive programmer.

null Russia, Rostov-on-Don

@TryGOTry
Try TryGOTry
一个搞安全的菜鸡脚本小子罢了。

tryblog@t00ls.net

@securifybv
Securify securifybv

Software Security Amsterdam

@lintstar
Lintstar lintstar
Pursuing art and starlight.
@Hagrid29
Hagrid29

Hong Kong

@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@0xHossam
Hossam Ehab 0xHossam
Red Team Analyst @ Dark Entry | Interested in Red Teaming & Malware Researching

@darkentryams Egypt

@rvrsh3ll
Steve Borosh rvrsh3ll
I hack code together and hope it works.

https://futuresec.io Gamma Quadrant 4

@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@INotGreen
NoGreen INotGreen
Offensive Code Researcher

Hong Kong, China

@abc123info
希潭实验室 abc123info
ABC_123,2008年入行网络安全,某部委网络安保工作优秀个人,某部委网络安全防护培训外聘讲师,某市局特聘网络安全专家,某高校外聘讲师,希潭实验室创始人。Struts2检测工具及Weblogic T3/IIOP反序列化工具原创作者,擅长红队攻防,APT技战法分析,代码审计,内网渗透。
@The-Z-Labs
Z-Labs The-Z-Labs
Adversary Simulation Operations and R&D Laboratories

Poland

@RedSiege
Red Siege RedSiege
Offensive Services from Offensive Minds
@matro7sh
matro7ch habibi matro7sh
Pentester tools

127.0.0.1

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@nickvourd
Nikos Vourdas nickvourd
Just your friendly neighborhood red Power Ranger:~# OSWE | OSEP | OSCP | OSWP | CRTL | CRTO | OASP

EY ATH, GR

@EgeBalci
Ege Balcı EgeBalci
Security Researcher

PRODAFT Den Haag, Netherlands

@0xEr3bus
Shashwat Shah 0xEr3bus
A young guy, highly interested in Offensive, Red teaming, and Windows Side. Visit my blog here blog.shashwatshah.me
@YDHCUI
道长且阻 YDHCUI

Q94284092@QQ.COM 广州

@0xDeku
Alon Leviev 0xDeku
Security Researcher
@SafeBreach-Labs
SafeBreach Labs SafeBreach-Labs
SafeBreach Labs

Worldwide

@antlabs
蚂蚁实验室 antlabs
高性能lib库和分布式解决方案
@3gstudent
3gstudent
good in study,attitude and health.
@lsecqt
Lsec lsecqt
OSEP / OSCP / Penetration Tester / Vulnerability Researcher / Youtuber
@dust-life
Life dust-life
应无所住,而生其心