Skip to content
View b4cktr4ck2's full-sized avatar

Block or report b4cktr4ck2

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@danielbohannon
Daniel Bohannon danielbohannon
Principal Applied Security Researcher (prev IR Consultant)

Mandiant Washington, D.C.

@KiFilterFiberContext
KiFilterFiberContext
Undergraduate CS student at Arizona State University

United States

@EspressoCake
EspressoCake
Somewhere, doing something.
@jhalon
Jack Halon jhalon
Red Team and Offensive R&D
@horizon3ai
Horizon 3 AI Inc horizon3ai
AI-powered Pen Tests. See your enterprise through the eyes of an attacker & fix what matters.
@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP

@SpecterOps France

@Freakazoidile
Freakazoidile
Penetration Tester. Scripts, projects, misc. OSCP, OSCE, GWAPT
@meziantou
Gérald Barré meziantou
Microsoft MVP, Software engineer, blogger

Montreal

@ZephrFish
Andy | ZephrFish ZephrFish
Builder, Leader, Thinker, FAFO Engineer

Scotland

@CrowdStrike
CrowdStrike CrowdStrike

United States of America

@snovvcrash
snovvcrash snovvcrash
Sr. Penetration Tester / Red Team Operator, author of the Pentester’s Promiscuous Notebook

(ノ°∀°)ノ⌒・*:.。. .。.:*・゜゚・*☆

@bopin2020
bopin bopin2020
Binary ~

Fairyland

@solfer
Felipe Solferini solfer

Lares United Kingdom

@MrTurvey
TurvSec MrTurvey
I push buttons and make hax.
@historicalsource
Historical Source historicalsource
A collection of historical source files, for education and perusal.
@abboudl
Louai Abboud abboudl
Sheridan Infosec Student, Western HBA graduate. Alternate school account: abboudl-sheridan
@RedLectroid
ShellStorm RedLectroid
Computer security enthusiast and martial artist. I like to find holes in defenses and exploit them.
@mdsecresearch
MDSec Research mdsecresearch
Public research and tools from MDSec Consulting

MDSec UK

@paranoidninja
Paranoid Ninja paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting

Dark Vortex Last seen in Ring 0. Current Location Unknown

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@MalwareCube
Andrew MalwareCube
Security engineer, hacker, educator.
@secretsquirrel
midnite_runr secretsquirrel
I laugh in the general direction of security products.
@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My learning platform links: https://truecyber.world https://mr.un1k0d3r.world

TrueCyber Inc.

@moloch--
Joe moloch--
I like computers.

Hacker / Programmer Earth

@EgeBalci
Ege Balcı EgeBalci
Security Researcher

PRODAFT Den Haag, Netherlands