Skip to content
View 0r3ak's full-sized avatar

Sponsoring

@mgeeky

Block or report 0r3ak

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@zhaodie
zhaodie

奇安信

@10cks
10cks 10cks
Security Researcher
@kyleavery
Kyle Avery kyleavery
debugging with printf

@outflanknl Texas, USA

@veo
veo veo
Hippies love LSD, VEO love freedom 😈
@Leo4j
Rob Leo4j
Active Directory, Red Teaming, and Network Security
@P4nda0s
PandaOS P4nda0s
Rust / Security / Binary / Syclover / Nu1L

Chengdu

@TianNaYa
TianTianYa TianNaYa
hahahahahahaha

null null

@Neo-Maoku
毛酷Neo Neo-Maoku
专注于红队实战攻防、二进制攻防、免杀等原创内容分享
@He1za1
He1za1(黑仔) He1za1
向攻防对抗和红队武器化研究进军~~~

Novasec China

@oops4git
Steven oops4git
One S.F

None S.F

@Vasco0x4
Vasco Vasco0x4
Malware Development | Reverse Engineering | Memory Hacking | C2

kernel32.dll

@Whitecat18
Smukx ♠ Whitecat18
Offensive code writer. 20 y/o.

0.0.0.0 127.0.0.1

@SpecterOps
SpecterOps SpecterOps

United States of America

@fobrs
Ferdinand Oeinck fobrs
Develop software since 1984, mainly in C++ and C#

Big Roses Software Netherlands

@SmokeLoader
Smoke SmokeLoader
Posting some free stuff
@janoglezcampos
Yxel janoglezcampos
:P

Vigo, Galicia, Spain

@INotGreen
NoGreen INotGreen
网络安全研究、区块链、web3开发

Hong Kong, China

@b23r0
b23r0 b23r0
Life was like a box of chocolates

Cybertron

@blackarrowsec
BlackArrow blackarrowsec
offensive driven defense
@Cryakl
Cryakl Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.

TG Sweden

@3xploit666
3xploit 3xploit666
💻 Passionate Malware Developer | 🛡️ Pentester & Red Team Specialist | 🔍 Exploring Cybersecurity

cairo

@therealdreg
Dreg therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher

rootkit.es Spain

@Binary-Offensive
mgeeky | Binary-Offensive.com Binary-Offensive
My private Offensive Security Tooling (OST) shared with InfoSec Professionals & sponsors with aim to improve cyber-resilience against real-world APTs

Poland

@ElliotKillick
Elliot Killick ElliotKillick
Security engineer and researcher. Avid developer. Infosec aficionado

Application Security Consultant @ RBC Toronto, Canada

@Afonsooo
Afonso Afonsooo
C++, C, C# developer and security researcher. (sometimes i break stuff while doing it LOL)

Brazil

@Maldev-Academy
Maldev Academy Maldev-Academy
A comprehensive module-based malware development course providing fundamental to advanced level knowledge
@SsageParuders
SsageParuders SsageParuders
Here just a lazzy boy ... zZz ~~

Student China

@WKL-Sec
White Knight Labs WKL-Sec

White Knight Labs USA

@0xb11a1
Bilal 0xb11a1
Writing buggy code
@florylsk
Florinel Olteanu florylsk
Adversary Emulation at Telefónica Tech Red Team.

Telefónica

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@NYAN-x-CAT
NYAN CAT NYAN-x-CAT
ᴄʏʙᴇʀsᴇᴄᴜʀɪᴛʏ ᴀɴᴅ ᴘᴇɴᴇᴛʀᴀᴛɪᴏɴ ᴛᴇsᴛɪɴɢ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇs ᴏɴʟʏ (I don't have YouTube channel)

Kuwait

@zhzyker
之乎者也 zhzyker
天苍苍,野茫茫,风吹的我就像头羊~ @0-sec && @pwnwiki-project && @xiecat

@0-sec @xiecat @pwnwiki-project @cisp-pte @YanYun-Lab ${jndi:ldap://127.0.0.1/zhzyker}

@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.