Skip to content
View thejanit0r's full-sized avatar

Block or report thejanit0r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@torvalds
Linus Torvalds torvalds

Linux Foundation Portland, OR

@ataradov
Alex Taradov ataradov

Colorado Springs, CO

@0xeb
Elias Bachaalany 0xeb
** YouTuber ** Author: Batchography ** Co-author: Practical Reverse Engineering & Antivirus Hacker's Handbook.
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@corkamig
Ange Albertini corkamig
Security Engineer

Google

@hugsy
crazy hugsy hugsy
Exploit Dev & OffSec Tool Dev

@blahcat Ring0

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@DebugPrivilege
DebugPrivilege DebugPrivilege
Security Person with interest in troubleshooting problems on Windows.
@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@matrosov
Alex Matrosov matrosov
IDAholic, #CodeXplorer, @REhints , "Rootkits and Bootkits" book co-author (http://bootkits.io), Firmware voodoo, and TEE exorcist.

BINARLY Los Angeles CA

@williballenthin
Willi Ballenthin williballenthin
/usr/bin/nethack

@mandiant

@gtworek
Grzegorz Tworek gtworek
https://linkedin.com/in/grzegorztworek
@trufae
pancake trufae

NowSecure Internet

@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(x(x_(x_x(O_o)x_x)_x)x)

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@therealdreg
Dreg therealdreg
Senior Malware Researcher, OS Internals, C/C++, assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC

rootkit.es Spain

@panda-re
PANDA panda-re
PANDA: Platform for Architecture-Neutral Dynamic Analysis

United States of America

@unicorn-engine
Unicorn Engine unicorn-engine
Multi-arch multi-platform CPU emulator framework
@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@strazzere
Tim Strazzere strazzere
Everything can be reversed

Red Naga California

@iPower
iPower iPower
Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @thesecretclub.

Mom's basement

@JustasMasiulis
Justas Masiulis JustasMasiulis
Solving life problems with templates

Lithuania, Vilnius

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@ionescu007
Alex Ionescu ionescu007
VP of EDR Strategy at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.alex-ionescu.com

Winsider Seminars & Solutions Inc.

@swwwolf
swwwolf swwwolf
Virii Cthulhu, Malware Expert at Kaspersky Lab, R&D, anti-rootkit, Windows internals, debugging, articles, etc...

swwwolf Russian Federation

@LordNoteworthy
Noteworthy LordNoteworthy
Conditionally married to malwares.
@atom0s
atom0s
Self-taught programmer, reverse engineer, game hacker, and modder. 🌈 Personal Discord Server: https://discord.gg/UmXNvjq

127.0.0.1

@hellman
Aleksei Udovenko hellman
Crypto / CTFs / etc.

@cryptolu Somewhere

@angea
Ange Albertini angea
Reverse engineer, author of Corkami