Skip to content
View truonghuuphuc's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report truonghuuphuc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@AravGarg
cyber8knight AravGarg
iOS 0click Vulnerability Researcher

--------

@EQSTLab
EQSTLab EQSTLab
Experts, Qualified Security Team

Experts, Qualified Security Team

@zcgonvh
zcgonvh zcgonvh
Window and .net
@sourceincite
Source Incite sourceincite

Source Incite Mérida

@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@DebugPrivilege
DebugPrivilege DebugPrivilege
Security Person with interest in troubleshooting problems on Windows.
@Frycos
Frycos Frycos
Red teamer

Germany

@retr0reg
Patrick Peng retr0reg
15 | Threat Research

Avon, CT

@kikfox
kikfox kikfox
Android re-engineering tools thekikfox@gmail.com https://t.me/kikfox
@ax1sX
AxisX ax1sX
安全从业者

Beijing China

@rafiem
Rafie Muhammad rafiem
Try Hard Learner

Indonesia

@X1r0z
X1r0z X1r0z
Web Security, @Nu1LCTF & @StrawHatCTF

NJUPT Nanjing, China

@Zeyad-Azima
Zer0verflow Zeyad-Azima
Offensive Person, who is playing around the core of the 7 layers to build the 0Day Empire.

Malaysia

@phith0n
Owen Gong phith0n
Creator of @vulhub

Singapore

@ivRodriguezCA
Iv ivRodriguezCA
Mobile AppSec,  Reverse Engineering & Crypto(graphy).

Planet Earth

@W01fh4cker
W01fh4cker W01fh4cker
Doubt is the key to knowledge.
@hluwa
葫芦娃 hluwa
端茶送水扫地擦窗浇花喂鱼保洁通马桶拔网线

China, Swatow

@orwagodfather
orwa atyat orwagodfather
https://hackerone.com/mr-hakhak https://bugcrowd.com/orwagodfather
@emadshanab
Emad Shanab emadshanab
https://www.buymeacoffee.com/firofivi

Emad Shanab Egypt

@Ivan1ee
Ivan Lee Ivan1ee
Security Researcher,Pentester
@xcanwin
未知可行 xcanwin
遇事不决,量子力学。

Contact: IHhjYW53aW5AZ21haWwuY29t China

@motikan2010
motikan2010 motikan2010
Web Engineer / OSS Security Junkie

Japan

@lyy289065406
EXP lyy289065406
C/C++, Java, Python, ASM, Ruby, Lua, HTML, CSS, JS, CN, EN, JP, CTF, ACMer

HongKong China

@OsandaMalith
Osanda Malith Jayathissa OsandaMalith
Love to break things, make things and make things that break things :) Just another security researcher interested in exploring new things.

@Visa London

@ThrynSec
Thryn ThrynSec
InfoSec Expert & OSInt amateur

France

@Am0rphous
Am0rphous
“Curiosity is the engine of achievement - Ken Robinson". Interested in cybersec and opsec. Onion operator.

Earth

@reprise99
reprise99
global hunting & oversight @microsoft

@Microsoft

@alperg
Alper Gokcehan alperg
JavaScript et al.

RTP, NC, United States

@horizon3ai
Horizon 3 AI Inc horizon3ai
AI-powered Pen Tests. See your enterprise through the eyes of an attacker & fix what matters.
@Y4Sec-Team
Y4 Security Team Y4Sec-Team
Security Team mainly working on Java vulnerability research
@4ra1n
4ra1n 4ra1n
Jar Analyzer 开发者
@TideSec
重剑无锋 TideSec
一心不动,大巧不工。

Tide China

@cjm00n
cjm00n cjm00n
Just another security researcher
@Velocidex
Velocidex Velocidex
Velocidex is the company behind Velociraptor - Dig Deeper!

Gold Coast, Australia

@hacksysteam
HackSys Team hacksysteam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

HackSys Inc

@ddosi
hack ddosi
GitHub已被封,转 https://www.ddosi.org/ https://w.ddosi.workers.dev/ 本项目有关分类渗透测试信息安全黑客极客暗网资源的收集整理[书籍视频教程]欢迎各位关注QQ569743

ddosi USA

@LuemmelSec
LuemmelSec
Personal blog: https://luemmelsec.github.io
@watchtowrlabs
watchTowr Labs watchtowrlabs
Labs division of watchTowr
@Chocapikk
Valentin Lobstein Chocapikk
Ma passion: casser des trucs. Mais bien comme il faut.

France

@sqrtZeroKnowledge
TOUHAMI KASBAOUI sqrtZeroKnowledge
WORK HARD TO MAKE IT VULNERABLE AND SECURE IT AGAIN.

@0btemos Ethernet