Skip to content
View ih-4n6's full-sized avatar

Block or report ih-4n6

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@TheMagicClaw
Magic Claw TheMagicClaw
I am a claw doing claw work.
@tired-labs
TIRED Labs tired-labs
Threat (Intelligence | Response | Emulation | Detection) Research
@BushidoUK
BushidoToken BushidoUK
Security Researcher

@curated-intel

@threeplanetssoftware
Three Planets Software threeplanetssoftware
Views and opinions expressed are my own and not from my employer.

Three Planets Software The digital landscape

@Lazza
Andrea Lazzarotto Lazza
Digital Forensics Consultant and Software Developer

Italy

@gchq
GCHQ gchq
We are the UK's intelligence, security and cyber agency. Our mission is to help keep the country safe.

UK

@tsale
Kostas tsale
Coding mostly for threat hunting, threat intelligence, and detection engineering.

Mars

@olafhartong
Olaf Hartong olafhartong

@FalconForceTeam The Netherlands

@WKL-Sec
White Knight Labs WKL-Sec

White Knight Labs USA

@center-for-threat-informed-defense
The Center for Threat-Informed Defense center-for-threat-informed-defense
An R&D organization focused on advancing the state of the art and the state of the practice in threat-informed defense.

United States of America

@embee-research
Matthew embee-research
Security Research and Threat Intelligence
@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@RiccardoAncarani
Riccardo Ancarani RiccardoAncarani
Principal Security Consultant @ WithSecure

WithSecure London, United Kingdom

@rsmudge
Raphael rsmudge
Archive of my cybersecurity related snippets and projects.
@buffer
Angelo Dell'Aera buffer
Linux kernel hacker, deeply interested in every facet of computer and information security, intensely involved in exploring and analyzing new emerging threats.

The Honeynet Project Italy

@sbousseaden
sbousseaden
Threat Hunting & DFIR
@EricZimmerman
Eric EricZimmerman
I code stuff! However, this is time consuming! Please consider supporting my work via GitHub sponsors: https://github.com/sponsors/EricZimmerman

ZimTech4n6 Indianapolis

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@infosecn1nja
Rahmat Nurfauzi infosecn1nja
Security Researcher/Red/Purple Teaming/Adversary Simulation/Threat Hunter. Contributors of Atomic Red Team, PS Empire, MITRE ATT&CK Framework, LOLBas, and more.

Jakarta, Indonesia

@williballenthin
Willi Ballenthin williballenthin
/usr/bin/nethack

@HexRaysSA

@RamblingCookieMonster
Warren Frame RamblingCookieMonster
Perpetual student

USA; Boston Area, MA

@randomaccess3
Phill Moore randomaccess3
DFIR examiner based in Sydney

Sydney, Australia

@gleeda
gleeda (Jamie Levy) gleeda
Core Developer for the @volatilityfoundation | Director of R&D for @huntresslabs | Overall DFIR enthusiast.

@volatilityfoundation @huntresslabs

@cobbr
Ryan Cobb cobbr

SpecterOps Dallas, TX

@Broctets-and-Bytes
Brock Bell Broctets-and-Bytes
I work in forensics and incident response. I make simple niche things to solve broken process and onsite problems.
@Sh1n0g1
Sh1n0g1 Sh1n0g1
Security Researcher // Malware *simulator* developer // CTF Organizer

JAPAN

@JohnLaTwC
John Lambert JohnLaTwC
@JohnLaTwC Security Fellow and Corporate Vice President, Microsoft Security

Microsoft Corporation

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@angea
Ange Albertini angea
Reverse engineer, author of Corkami
@nogoodconfig
CIRT Josh nogoodconfig
Full time incident responder, part time Python/PowerShell lover

UK

@danielbohannon
Daniel Bohannon danielbohannon
Principal Applied Security Researcher (prev IR Consultant)

Mandiant Washington, D.C.

@blacktop
blacktop

Nowheresville