Skip to content
View bopin2020's full-sized avatar
🏠
IMarshal
🏠
IMarshal

Block or report bopin2020

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@CppCon
CppCon CppCon
The C++ Conference
@hugsy
crazy hugsy hugsy
Exploit Dev & OffSec Tool Dev

@blahcat Ring0

@nlitsme
willem nlitsme
Currently mostly programming in C++ and python. Reverse engineering phone firmware since 2003. Interested in everything.

@gsmk

@Zombie-Kaiser
linux addict Zombie-Kaiser
Think of “free” as in “free speech”, not as in “free beer”

FSF.org China

@WireGuard
WireGuard WireGuard
Mirror of various WireGuard-related projects. See https://www.wireguard.com/repositories/ for official repositories.
@giantbranch
giantbranch giantbranch
continue to challenge what I want

security company Beijing,China ==> Guangzhou,China

@0linlin0
Skay 0linlin0
I fell in love with my computer : )
@awakecoding
Marc-André Moreau awakecoding
Remote desktop protocol expert, OSS contributor and entrepreneur. I love designing products with Rust, C# and PowerShell. Proud to be working at Devolutions.

Devolutions Lavaltrie, Quebec, Canada

@asklar
Alexander Sklar asklar
Principal Software Engineer @microsoft I work on AI and the Windows developer platform. #windows #ai

@Microsoft Redmond, WA

@kanren3
kanren3 kanren3
What is mind? No matter. What is matter? Never mind.
@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@mity
Martin Mitáš mity

Prague, Czech Republic

@tintinweb
tintinweb tintinweb
Uncertified Panda Trainer 🪴🐼🐼🪴

#moon

@eloj
Eddy L O Jansson eloj
I self-identify as a so called 'programmer'. In my spare time I enjoy the video games and stringology.

Sweden

@ph4ntonn
ph4ntom ph4ntonn
The wheel turns, nothing is ever new

Unknown EL3

@ByteWhite1x1
White Byte ByteWhite1x1
None of your business.

Finland

@vanhauser-thc
van Hauser vanhauser-thc
Security researcher since 1994 https://www.mh-sec.de/ https://www.thc.org/

The Hacker's Choice | mh-sec | me | myself Berlin

@emesare
mason emesare

@Vector35 Florida, USA

@jonpalmisc
Jon Palmisciano jonpalmisc
Software engineer & security researcher

0x180380000

@bsauce
bsauce bsauce
5th year Ph.D. student majoring in binary analysis.
@estr3llas
estr3llas

@radare2 on discord

@m1n9yu3
神说要有光. m1n9yu3
I Love Reverse Engineering.

china

@ThunderJie
ThunderJie
Windows Kernel | Blackhat 2022 | MSRC 2022 Q3 TOP 100

China

@0mWindyBug
Windy Bug 0mWindyBug
All roads lead back to ALPC
@jschicht
Joakim Schicht jschicht
Researcher and Forensic Analyst

Norway, Bergen

@SweetIceLolly
Hanson SweetIceLolly
𝓢𝔀𝓮𝓮𝓽 𝓘𝓬𝓮 𝓛𝓸𝓵𝓵𝔂.

⁄(⁄ ⁄•⁄ω⁄•⁄ ⁄)⁄ (✿◡‿◡)

@restriction
restriction
Senior Malware Researcher, OS Internals, C/C++, assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC

::1

@xsh3llsh0ck
SKVLLZ. xsh3llsh0ck
RE, Win Kernel, UEFI (DXE/PEI/SMM), Vüln Researcher.

Positive Technologies Svalbard

@adamhlt
Adam Henault adamhlt
🇫🇷 French PhD Student in Embedded System Security.

Lab-STICC Lorient, France