Skip to content
View LittlePony's full-sized avatar
💥
💥

Block or report LittlePony

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@matklad
Alex Kladov matklad
Computers, democracy, and nervous disorder.

@tigerbeetle Lisbon

@crossbario
Crossbar.io crossbario
Seamless connectivity for the IoT and real-time microservices

Worldwide

@sapics
T. Nishino sapics
programming <3

Kyoto, Japan

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex | 🇺🇦 Ukraine needs your help to kill Ruϟϟian zombies: 🔗 savelife.in.ua/en/donate 💪
@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@waldo-irc
waldo-irc
Just a guy made of green pixels.
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@Flangvik
Melvin L Flangvik
Team Lead @kovertno

Kovert AS Norway

@ionescu007
Alex Ionescu ionescu007
VP of EDR Strategy at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.alex-ionescu.com

Winsider Seminars & Solutions Inc.

@AzAgarampur
Arush Agarampur AzAgarampur
I enjoy Windows internals, low-level development, reverse engineering, and offensive security

California

@therealdreg
Dreg therealdreg
Senior Malware Researcher, OS Internals, C/C , assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC

rootkit.es Spain

@wbenny
Petr Beneš wbenny

Brno, Czech Republic

@mkaring
Martin Karing mkaring

Tele-Kabel-Ingenieurgesellschaft mbH Germany

@secretsquirrel
midnite_runr secretsquirrel
I laugh in the general direction of security products.
@Th3Wall
Davide Mandelli Th3Wall
Software Engineer | Lifelong learner

@klarna Milan, Italy

@DamonMohammadbagher
Damon Mohammadbagher DamonMohammadbagher
Security Researcher "https://damonmohammadbagher.github.io" , "https://medium.com/@DamonMohammadbagher"
@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(x(x_(x_x(O_o)x_x)_x)x)

@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@leftoright
望舒 leftoright
China numba van

Changde

@maxamin
Mohamed Amine Guesmi maxamin
Tunisian Security Researcher specializing in low-level applications, DevSecOps,WEB3, networking, and advanced threat hunting.Discord:2d5234

Looking for a job in IT Tunisia

@am0nsec
Paul L. (@am0nsec) am0nsec
Senior Security Consultant | кибервойна advocatus diaboli

EMEA

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@rossja
Jason Ross rossja
see: https://jasonross.info

Rochester, NY

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@med0x2e
Mohamed El Azaar med0x2e
RedTeamer & Security Researcher, used to be a Software Engineer/Developer, Manga/Anime Otaku

Yo. 127.0.0.1

@RCStep
Ryan Stephenson RCStep

United States of America

@reznok
Brandon Forbes reznok
Offensive Security Professional