Skip to content
View xct's full-sized avatar
🏴‍☠️
🏴‍☠️

Block or report xct

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@abhaybhargav
Abhay Bhargav abhaybhargav

we45 All over the world

@secureworks
Secureworks secureworks
Secureworks Open Source
@realoriginal
Austin Hudson realoriginal
Senior Researcher for Cobalt Strike.
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@zcgonvh
zcgonvh zcgonvh
Window and .net
@hacksysteam
HackSys Team hacksysteam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

HackSys Inc

@gbyx3
Gustav Alerby gbyx3
Security engineer, Purple teamer, Outdoors man. 🏕️

@Axians Luleå, Sweden

@shsirk
shsirk
Programming and Security

India

@L4ys
Lays L4ys
Lazy Security Researcher

@TrapaSecurity Taiwan

@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@badd1e
Alisa badd1e
Excellence is what mediocrity fears most

independent hyperspace

@OlivierLaflamme
Boschko OlivierLaflamme
Just a french canadien who likes computers.

HiddenLayer Toronto Canada

@topotam
Topotam topotam
All I know is that I know nothing. I like Windows, Active Directory and IoT/Hardware hacking.

Discreetly in your network

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@ryancdotorg
Ryan Castellucci ryancdotorg
Hacker. Enby. Bot slayer. Ex-sysadmin. Bureaucramancer. Purveyor of technically sophisticated shitposts. Forks are not endorsements.

London, UK

@lducas
Léo Ducas lducas
I break codes for a living. Sometimes I make one.

CWI Amsterdam

@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@andreafioraldi
Andrea Fioraldi andreafioraldi
Writing fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.

Antibes, France

@ptresearch
Positive Research ptresearch Suspended

Positive Research Team

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@swisskyrepo
Swissky swisskyrepo
Red Team Operator & Bug Hunter
@OJ
OJ Reeves OJ
CLIMBER NERD!

Crossfire Coding Australia

@zardus
Yan Shoshitaishvili zardus
Former DEFCON CTF org. @shellphish Captain Emeritus. Assoc Professor @ASU. American Cybersecurity Education Inst director. @angr & @pwncollege founder.

Tempe, AZ, USA

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@kmkz
Bourbon Jean-Marie kmkz
"all you need is pwn" - @kmkz_security

Bourbon Offsec Services Ëlwen (LU)

@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark