Skip to content
View moonflowersl's full-sized avatar

Block or report moonflowersl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@j00ru
Mateusz Jurczyk j00ru
Windows hacker & vulnerability researcher

Google

@exp-sky
exp-sky exp-sky
Security Researcher, Pwn2Own 2017 Edge Browser Winner. Tianfu Cup 2018 and Tianfu Cup 2019 Edge Browser and Sandbox bypass Winner.
@passthehashbrowns
passthehashbrowns
Red teamer/mediocre developer
@piglei
piglei piglei
A Python programmer who enjoys writing and reading beautiful code. Also coding in Go, JavaScript.

Tencent ShenZhen, China

@qinguoyi
qinguoyi
neo

同程旅行/腾讯 成都

@cedrickchee
Cedric Chee cedrickchee
Lead Software Engineer | LLMs | Go/JS, backend | product dev @ startups | 🧑‍🎓 CompSci | alumni: fast.ai, Antler.co

InvictusByte PID 1

@maxDcb
Maxime dcb maxDcb
OSEP | OSED | OSCP | CRTO - Senior Information Security Engineer

France

@Offensive-Panda
Usman Sikander Offensive-Panda
An infosec guy who's constantly seeking for knowledge.

Cytomate solutions and services Qatar

@BlackSnufkin
BlackSnufkin
Red Team | Malware Dev
@biraj21
Biraj biraj21

Bangalore, India

@L4ys
Lays L4ys
Lazy Security Researcher

@TrapaSecurity Taiwan

@stephenfewer
Stephen Fewer stephenfewer
Software vulnerabilities, reverse engineering, and developer tooling.

Ireland

@smolorg
smolorg smolorg
smol implementations of cool things
@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@0xEr3bus
Shashwat Shah 0xEr3bus
A young guy, highly interested in Offensive, Red teaming, and Windows Side. Visit my blog here blog.shashwatshah.me
@kyleavery
Kyle Avery kyleavery
debugging with printf

@outflanknl Texas, USA

@ElliotKillick
Elliot Killick ElliotKillick
Security engineer and researcher. Avid developer. Infosec aficionado

Application Security Consultant @ RBC Toronto, Canada

@Whitecat18
Smukx ♠ Whitecat18
Offensive code writer. 20 y/o.

0.0.0.0 127.0.0.1

@eknoes
Sönke eknoes
PhD student @ University of Göttingen, Germany

Göttingen, Germany

@Nautilus-Institute
Nautilus Institute Nautilus-Institute
DEF CON CTF Organizers for 2022-2025

United States of America

@ZacharyZcR
ZacharyZcR
I'm just going to make a piece of shit out of it. 我就是要做一坨狗屎出来。
@andreafioraldi
Andrea Fioraldi andreafioraldi
Writing fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.

Antibes, France

@h1994st
Shengtuo Hu h1994st
Think More, Do More, and Talk More :)
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@S3N4T0R-0X0
S3N4T0R S3N4T0R-0X0
specialization in Adversary Simulation, Malware Dev & Red Team Activates, passionate about all things related to Cyber Security
@SonicStark
Sonic SonicStark

localhost /dev/null

@icyguider
icyguider icyguider
It's sipple out there!
@LiveOverflow
LiveOverflow
wannabe hacker...
@WinMin
swing WinMin
Focus on Vulnerability Discovering and as CTF Player @FlappyPig @r3kapig

@chaitin Beijing,China

@xnl-h4ck3r
/XNL-h4ck3r xnl-h4ck3r
Aspiring Bug Bounty Hunter and developer of tools! 🤘

Wales

@WindXaa
WindXaa WindXaa
Life is a never-ending struggle!

SiChuan

@FunnyWolf
rootkit FunnyWolf
Make Hacking Easier
@hackerschoice
The Hacker's Choice hackerschoice
IT Security Research Group (Non-profit)

Everywhere

@JetP1ane
JetP1ane
James B.

Coalfire

@b23r0
b23r0 b23r0
Life was like a box of chocolates

Cybertron

@saaramar
Saar Amar saaramar
Reversing, exploits, {Windows, Hyper-V, iOS} internals, mitigations.
@b1tg
b1tg
know your stuff