Skip to content
View armag3dd0n's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report armag3dd0n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@zyn3rgy
Nick Powers zyn3rgy
Adversary Simulation @ SpecterOps

SpecterOps

@epichoxha
epichoxha epichoxha
OSCP | OSEP | CRTO

::1

@SpecterOps
SpecterOps SpecterOps

United States of America

@Maldev-Academy
Maldev Academy Maldev-Academy
A comprehensive module-based malware development course providing fundamental to advanced level knowledge
@Cn33liz
Cn33liz Cn33liz

Groningen, the Netherlands

@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C dev. A bit of blogging and mainly everything related to information security.
@WKL-Sec
White Knight Labs WKL-Sec

White Knight Labs USA

@dirkjanm
Dirk-jan dirkjanm

Outsider Security The Netherlands

@cobbr
Ryan Cobb cobbr

SpecterOps Dallas, TX

@tsale
Kostas tsale
Coding mostly for threat hunting, threat intelligence, and detection engineering.

Mars

@am0nsec
Paul L. (@am0nsec) am0nsec
Senior Security Consultant | кибервойна advocatus diaboli

EMEA

@Hackcraft-Labs
Hackcraft Hackcraft-Labs
Crafting Artful Attacks

Greece

@SaadAhla
d1rk SaadAhla
Security researcher, malware dev

Morocco

@howmp
guage howmp
半块西瓜皮
@ly4k
Oliver Lyak ly4k
Security Researcher

IFCR Copenhagen, Denmark

@hacksysteam
HackSys Team hacksysteam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

HackSys Inc

@memN0ps
memN0ps
Rust programming, Windows internals, and reverse engineering. Member of @thesecretclub.

New Zealand

@MrEmpy
MrEmpy
「🎩」Pentester & Bug Hunter 「🟥」Red Team 「👾」CTF Player 「🤖」Developer 「▶️」Youtuber
@xRET2pwn
RET2pwn xRET2pwn
#24 y/o | Binary Exploitation Player | Wannabe Red Team Operator

Kernel

@CodeXTF2
CodeX CodeXTF2
Red teamer and offensive dev. I pop shells and play tf2.

im in school lol userland

@DarkCoderSc
Jean-Pierre LESUEUR (Microsoft MVP) DarkCoderSc
Security & Malware Researcher at PHROZEN

Phrozen France

@samratashok
Nikhil "SamratAshok" Mittal samratashok
Founder of Altered Security, Hacker, InfoSec Professional, PowerShell and AD pwner, Creator of Kautilya and Nishang :)

Altered Security

@NUL0x4C
NULL NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator
@LIJI32
Lior Halphon LIJI32
I fiddle with macOS, iOS, and Nintendo consoles.

Israel

@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(x(x_(x_x(O_o)x_x)_x)x)

@NtRaiseHardError
dtm NtRaiseHardError
Self-taught Windows wannabe reverse engineer

@0x00sec Someone's basement

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@moloch--
Joe moloch--
I like computers.

Hacker / Programmer Earth

@b33f00d
Raul b33f00d
RedTeamer

Space Dynamics Co. Earth

@enovella
Eduardo Novella enovella
Mobile Security Researcher

undefined

@rookuu
Luke Roberts rookuu
Red Teamer | MEng Mathematical Computation, UCL | Interests focused around adversary emulation and macOS.

@github London, UK