Skip to content
View RavenRootkit's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report RavenRootkit

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@NationalSecurityAgency
National Security Agency NationalSecurityAgency
Official organization account for the National Security Agency (NSA)

United States

@LaurieWired
LaurieWired
Reverse engineer specializing in cross-platform malware analysis with a focus on mobile threats.
@jonny-jhnson
Jonathan Johnson jonny-jhnson
Windows Internals Research and Telemetry Identification

USA

@rfackroyd
Richard Ackroyd rfackroyd
Security Engineer / Detection Engineer

London

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@TheRavenFile
The Raven File TheRavenFile
Official Git Repo of THE RAVEN FILE. Here, you can find useful IOCs observed during my Cyber Investigations.

Internet

@RedDrip7
RedDrip7 RedDrip7
Technical Twitter of QiAnXin Technology, leading Chinese security vendor. It is operated by RedDrip Team which focuses on malware, APT and threat intelligence.

Qianxin China

@milankovo
milankovo
IDA fanboy
@ZeroMemoryEx
Mairon ZeroMemoryEx
Cyber Security Consultant | Security Researcher
@mohitmishra786
chessMan mohitmishra786
I'm Mohit.❤️ You can also call me Chessman

Amadeus Dream

@sailay1996
valen sailay1996
Just an idiot, a tiny presence in an infinite universe. S-1-5-7

Myanmar

@trailofbits
Trail of Bits trailofbits
More code: binary lifters @lifting-bits, blockchain @crytic, forks @trail-of-forks

New York, New York

@behnamshamshirsaz
Behnam Shamshirsaz behnamshamshirsaz
Self studied Computer Programming by Reverse Engineering in 1986 ! Machine Language System Programming Since 1988…
@tinysec
TinySec tinysec
Security Researcher

you can guess moon

@binary-win
ME binary-win
►Low level Lover

Ghafghaz

@Warxim
Michal Válka Warxim
Software Engineer & Security Enthusiast

SentinelOne Brno, Czech Republic

@waelmas
Wael Masri waelmas
Most of my work is private, but sharing here what I can.

Europe

@myshell-ai
MyShell myshell-ai
We are building an open ecosystem for AI Native Apps.

United States of America

@sensepost
SensePost sensepost
Orange Cyberdefense's Ethical Hacking Team

The World

@kleiton0x00
kleiton0x00 kleiton0x00
Yet another infosec guy.

Austria

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@mlabonne
Maxime Labonne mlabonne
Head of Post-Training @ Liquid AI

Liquid AI London, United Kingdom

@umutcamliyurt
Umut Çamliyurt umutcamliyurt
Security researcher and bodybuilder 🦍🦍

Türkiye

@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@SafeBreach-Labs
SafeBreach Labs SafeBreach-Labs
SafeBreach Labs

Worldwide

@SleepTheGod
ClumsyLulz SleepTheGod
My only discord is clumsybeats t.me/SleepTheGod Linkedin.com/in/clumsy codepen.io/ClumsyLulz Youtube.com/Stripped Hackerone.com/DBMS Bugcrowd.com/Sleep

GitBrew Georgia

@Velocidex
Velocidex Velocidex
Velocidex is the company behind Velociraptor - Dig Deeper!

Gold Coast, Australia

@DebugPrivilege
DebugPrivilege DebugPrivilege
Security Person with interest in troubleshooting problems on Windows.
@Cyb3r-Monk
Mehmet E. Cyb3r-Monk
Cyb3rMonk

Netherlands

@crocodyli
crocodyli crocodyli
Repository of a threat intel analyst who tries to help the world be a better place...

127.0.0.1

@Faran-17
Chrollo.dll Faran-17
Security Researcher

User Space

@TakSec
TakSec TakSec
Pentester | Bug Bounty Hunter | AI Red Team

Palo Alto, CA

@t3l3machus
Panagiotis Chartas t3l3machus
Penetration Tester, Cybersecurity Researcher.
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@nu11secur1ty
nu11secur1ty nu11secur1ty
Hacker/Reverse Engineer/Red Team Penetration Tester/System Administrator/Linux Architect/IT infrastructure Engineer C, Perl, Python & Bash developer.