Skip to content
View jm33-m0's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro
Block or Report

Block or report jm33-m0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@rootkiter
rootkiter rootkiter
I'm foolish and hungry. 又蠢又饿。
@mahaloz
Zion Leonahenahe Basque mahaloz
Native Hawaiian | PhD Student @sefcom in Comp Sci | Prev Co-captain @shellphish | Decompiler Research

Arizona State University

@xiaoxiaoranxxx
xiaoxiaoranxxx xiaoxiaoranxxx
xiaoxiaoranxxx

xiaoxiaoranxxx xiaoxiaoranxxx

@NHAS
NHAS
Hi! Im a guy who is passionate about writing golang and security! In my repos you find my a lot of my half and fully baked projects.
@bytecode77
Martin Fischer bytecode77
Software Developer & IT Security Expert

Germany

@jermainlaforce
Jermain La Force jermainlaforce
H@ck3r......enough said

Toronto

@mwnickerson
Matthew mwnickerson
Security Consultant and Security Researcher

@layer8secure Philadelphia/Miami

@itaymigdal
Itay Migdal itaymigdal
Cyber Security geek
@MingcongBai
Mingcong Bai MingcongBai
Ho Ho Ho Ho Ho!

AOSC, deepin (UnionTech) China

@kholia
Dhiru Kholia kholia
Open-source software and hardware
@jerilkbestin
Hackerboy15 jerilkbestin
Script noob

vancouver

@NeoChen1024
Neo_Chen (BU4AK) NeoChen1024
神奇,永無止境的神奇。

Taichung, Taiwan

@krisnova
Kris Nóva krisnova
You should never run my code.

@github

@meganz
Mega Limited meganz

Auckland, New Zealand

@BishopFox
Bishop Fox BishopFox
The leader in offensive security, providing continuous pen testing, red teaming, attack surface management, and traditional security assessments.
@Topsec-bunney
Bunney Topsec-bunney
To be or Not to be .
@lockedbyte
lockedbyte lockedbyte
exploit dev | @Adepts-Of-0xCC | CTF Player w/ID10Ts
@malisal
Luka Malisa malisal

Zurich, Switzerland

@ufrisk
Ulf Frisk ufrisk
IT-Security Minion

Sweden

@cdprf
Yunus Emre YUCE cdprf
I was try to learn programming since 97. almost 20th years... i am getting old. when i learn somethings, i figure out how i was blind. how i "dont known jhonn".

centisoft.com Turkey

@b10n
b10n

Userland

@emptymonkey
孙悟空 emptymonkey
Linux Bender, Coffee Drinker, Red Team, Monkey King 🌑🐒

Water Curtain Cave

@aus
aus aus

Amazon Web Services Texas

@trung
⚆ Trung Nguyen trung
Code monkey's journey

n.o.w.h.e.r.e

@ItzSomebody
chris uchizono ItzSomebody
Math PhD student @ KU

University of Kansas United States

@5n1p3r0010
5n1p3r0010
(maybe)vegetable pwner
@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@bats3c
batsec bats3c

@MDSecactivebreach UK

@mvdan
Daniel Martí mvdan
Maintainer at @cue-lang, nerd sniper with @golang.

@cue-lang London, United Kingdom

@l0kihardt
lokihardt l0kihardt
Independent Security Researcher, Pentester, Former CTF Player @FlappyPig @r3kapig. Also a big fan of lokihardt. Now focusing on **Finance** and **Quant**.

TaiPei China

@brandonshiyay
brandonshiyay
web/browser/web3 audit discord: brandio
@RangerNJU
Ranger RangerNJU
(Was) A CS student in NJU. (Currently) A code typist and document reader in SH.

NJU China

@GoSSIP-SJTU
GoSSIP@SJTU GoSSIP-SJTU
Group of Software Security In Progress (G.O.S.S.I.P) 蜚语软件安全小组,来自上海交通大学

Shanghai Jiao Tong University Shanghai, China

@kevin-w-du
Kevin Du kevin-w-du
Wenliang (Kevin) Du, PhD, IEEE Fellow, is the Laura J. and L. Douglas Meredith Professor of Teaching Excellence at Syracuse University.

Syracuse University Syracuse, New York

@ThunderJie
ThunderJie
Windows Kernel | Blackhat 2022 | MSRC 2022 Q3 TOP 100

Kunlun Lab China

@YuZhang
Yuni YuZhang
Associate Prof. at CS.HIT. Research interests: Internet Measurement, Named Data Networking, Critical Internet Infrastructure

Harbin Institute of Technology, China Harbin, China

@rhelmot
Audrey Dutcher rhelmot
PhD student doing binary analysis, CTF player with Shellphish, founder at Emotion Labs

Emotion Labs Phoenix, AZ