Skip to content
View zer0matt's full-sized avatar

Block or report zer0matt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@zeze-zeze
Zeze zeze-zeze

TeamT5 Taiwan

@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@xalicex
Alice xalicex
Offsec, Malware & Stuff
@whitequark
Catherine whitequark
the catgirl knows where it is at all times

@SCISemi UK

@Ana06
Ana María Martínez Gómez Ana06
Reverse Engineer @mandiant / @google

@google @mandiant

@oneafter
GlitchLens oneafter
Vulnerability Researcher | Security Tools Developer • 🔍 Focusing on the bugs others miss • 🛠️ C/C++/Java, Static Analysis, Fuzzing
@xM0kht4r
M0kht4r xM0kht4r
Cybersecurity enthusiast with a deep passion for malware development, research and offensive security.

Morocco

@Morilli
Moritz Bender Morilli
Currently studying computer science and just trying to have fun with some programming :)

Germany

@bootkitsbook
Rootkits and Bootkits bootkitsbook
Reversing Modern Malware and Next Generation Threats by Alex Matrosov, Eugene Rodionov, and Sergey Bratus
@lizhirui
lizhirui lizhirui
I'm a grade 3 master of XMU.I'm studying the Linux kernel and RISC-V CPU Design now.

Xiamen University Xiamen, Fujian, China

@david-a-wheeler
David A. Wheeler david-a-wheeler
I work at the Open Source Security Foundation (OpenSSF), part of the Linux Foundation. Much of this isn't work though.

Linux Foundation US East Coast

@Idov31
Ido Veltzman Idov31
I'm a security researcher and using this platform to share my projects and research :)

mov rax, [rbp+location]

@ayyucedemirbas
Ayyuce Demirbas ayyucedemirbas
Computer Science and Engineering PhD Student & Research Assistant | Machine Learning & Multi-omics, GSoC 2022 @tensorflow

University of North Texas Deep Space Nine

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 Windows malware afficionado. 🛡️ Securing the world by stealing cyber criminals' operation theater

Binary-Offensive.com Poland

@connormcgarr
Connor McGarr connormcgarr

United States of America

@eversinc33
eversinc33 eversinc33

Check Point Research Vienna

@felixm-pw
Felix M felixm-pw
Sr Security Researcher

London

@repnz
Ori Damari repnz
windows kernel research & development

0x7c00

@CVEProject
CVE Program CVEProject
The mission of the CVE™ Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@hacksysteam
HackSys Team hacksysteam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

HackSys Inc

@YouNeverKnow00
Emree YouNeverKnow00
Software Developer 👨‍💻

127.0.0.1

@Zerotistic
Zerotistic Zerotistic
CTF player, i like binary ninja.

phasetw0

@thamognya
Thamognya thamognya
Fuufu Ijou is goated.

/dev/null /home/thamognya

@malware-unicorn
malwareunicorn malware-unicorn
MALWARE + FASHION = UNICORN Reverse Engineering Malware twitter: @malwareunicorn

San Francisco

@zaerald
zaerald (ゼイラルド) zaerald
💻 I'm a daemon process that knows nothing.
@kaizensecurity
kzn.eth kaizensecurity

Depends where the Tor exit node

@LaurieWired
LaurieWired
Reverse engineer specializing in cross-platform malware analysis with a focus on mobile threats.
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@es3n1n
Arsenii es3n1n es3n1n
slightly below average

not_es3n1n on discord

@0xcpu
panda bear 0xcpu
nothing interesting