Skip to content
View 0xbad53c's full-sized avatar

Block or report 0xbad53c

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@ev0x
ev0x
Penetration tester/Red Teamer. Ping me on twitter @TheEv0x
@NUL0x4C
NULL NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
@VirtualAlllocEx
VirtualAllocEx VirtualAlllocEx
Founder RedOps | Red Team | Böhse fürs Leben

RedOps GmbH

@Flangvik
Melvin L Flangvik
Team Lead @kovertno

Kovert AS Norway

@XaFF-XaFF
XaFF XaFF-XaFF
Expert @ Googling stuff

Poland

@DXC-StrikeForce
DXC Technology - StrikeForce DXC-StrikeForce
Global Red Team of DXC Cyber Defence
@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@paranoidninja
Paranoid Ninja paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting

Dark Vortex Last seen in Ring 0. Current Location Unknown

@klezVirus
klezVirus
Lucky husband, proud father, and security researcher
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@pazwant
PAZ pazwant
-BlackSea-

Amsterdam

@Cerbersec
Cerbersec Cerbersec

NVISO Underworld

@sbasu7241
Soumyadeep Basu sbasu7241
CTF 🚩 ● Hack the Box ● CyberSec Enthusiast ● Snooker Addict

@TeamUnderdawgs West Bengal, India

@monoxgas
Nick Landers monoxgas

@dreadnode Utah, United States

@m57
Mitch Hines m57
g0dmode

@cyndicatelabs

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@ChaitanyaHaritash
Chaitanya Haritash ChaitanyaHaritash
You will always find me learning something new all the time.

lost

@Inf0secRabbit
Inf0secRabbit
Just Another Red Team Guy !

Crowdstrike Ring 0

@med0x2e
Mohamed El Azaar med0x2e
RedTeamer & Security Researcher, used to be a Software Engineer/Developer, Manga/Anime Otaku

Yo. 127.0.0.1

@bats3c
batsec bats3c

@MDSecactivebreach UK

@dirkjanm
Dirk-jan dirkjanm

Outsider Security The Netherlands

@rxwx
Rich Warren rxwx

@AmberWolfCyber UK

@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@jhalon
Jack Halon jhalon
Red Team and Offensive R&D

US

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@hktalent
51pwn hktalent
no money no happy
@byt3bl33d3r
Marcello byt3bl33d3r
T H I C C M A L W A R E

ProtectAI Error: Unable to resolve

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@xorrior
Chris Ross xorrior
PowerShell, C#, Obj-C, macOS Security Researcher, Red Team Operator
@slyd0g
Justin Bui slyd0g

@snowflakedb Los Angeles, CA