Skip to content
View exord66's full-sized avatar

Block or report exord66

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@veo
veo veo
Hippies love LSD, VEO love freedom 😈
@exploits-forsale
Exploits.Forsale exploits-forsale
Leaders in Cyber Lethality
@Devolutions
Devolutions Devolutions

Lavaltrie, Quebec, Canada

@zeronetworks
Zero Networks zeronetworks
MFA-based Microsegmentation and Advanced ZTNA
@3gstudent
3gstudent
good in study,attitude and health.
@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@gabriellandau
Gabriel Landau gabriellandau
WinDbg’er at @elastic security

Elastic Maryland

@nettitude
LRQA Nettitude nettitude
Making the world more secure - one line of code at a time!

United Kingdom

@GhostPack
GhostPack GhostPack
A collection of security related toolsets.
@ASkyeye
ASkyeye
RedTeam fork robot. ⚠️Please check the source code carefully before using the tool. :)
@realoriginal
Austin Hudson realoriginal
Professional Inquiries: austinhudson@protonmail.ch. Cobalt Strike Research & Development Team
@mpgn
mpgn
̿ ̿̿'̿'\̵͇̿̿\=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿

France

@dr4k0nia
drakonia dr4k0nia
Security Researcher specializing in .NET malware analysis and tooling

Germany

@NUL0x4C
NULL NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
@zblurx
zblurx
OffSec / Python3 / Rust / Go / Docker

France

@Hackndo
Pixis Hackndo
Security blog author https://hackndo.com

Login Sécurité Paris

@dev-2null
dev2null dev-2null
Penetration Tester | OSCP | OSCE | OSEP | AD Security Enthusiast | Allowed To Act On Behalf Of Other Identity

Forest

@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(x(x_(x_x(O_o)x_x)_x)x)

@dirkjanm
Dirk-jan dirkjanm

Outsider Security The Netherlands

@lkarlslund
Lars Karlslund lkarlslund
Curious Security Minded Octopus, freelance security consultant, loves Active Directory, finding holes in the cheese, coding Golang, ntlm.pw

NetSection Security Denmark

@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@pry0cc
pry0cc pry0cc
Inventor of Axiom

Austin, TX

@h3xduck
Marcos Bajo h3xduck
PhD student at CISPA and cybersecurity researcher. Passionate about low-level programming, malware and security in general.

Dortmund, Germany

@xalicex
Alice xalicex
Offsec and Stuff
@S3cur3Th1sSh1t
S3cur3Th1sSh1t
Pentesting, scripting and pwning!

r-tec IT Security GmbH 127.0.0.1

@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@aaaddress1
Sheng-Hao Ma aaaddress1
30cm.tw/me

TXOne Networks Inc. Taiwan

@bats3c
batsec bats3c

@MDSecactivebreach UK

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team