Skip to content
View BlackTrace's full-sized avatar

Block or report BlackTrace

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@SinaKarvandi
Sina Karvandi SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex
@entropy-z
__oblivion entropy-z
Sr. Red Team Operator | eJPT | CRTP | CRTE | CRTO | CRTL
@CICADA8-Research
CICADA8 Research CICADA8-Research
CICADA8 is a vulnerability management service with real-time cyber threat tracking capabilities.

Russian Federation

@eversinc33
eversinc33 eversinc33

Check Point Research Vienna

@micREsoft
MicREsoft micREsoft
micREsoft: Dedicated to Windows reverse engineering!
@0xflux
flux 0xflux
CRTO | Professional Red Team offensive engineer. Passionate about cyber defence, security research, and systems programming.

North West, England

@momo5502
Maurice Heumann momo5502
I used to be an adventurer like you. Then I took a "Violation of Intellectual Property Rights" in the knee.

@thalesgroup

@noahware
noahware noahware
C/C++ Developer
@topotam
Topotam topotam
All I know is that I know nothing. I like Windows, Active Directory and IoT/Hardware hacking.

Discreetly in your network

@zyantific
zyantific
Reverse engineering team. Not a company.

Germany

@badhive
badhive badhive
Security Research and Development
@T3nb3w
T3nb3w T3nb3w
Learner :)

UK

@notcpuid
William Long notcpuid
malware analysist / security researcher / reverse engineer

Abu Dhabi

@logangoins
Logan Goins logangoins
Adversary Simulation @SpecterOps

@Specterops Texas

@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
@Cryakl
Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.
@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@wtdcode
lazymio wtdcode
Learn, think, and break.

Singapore

@Naville
Zhang Naville
SMT / SAT, Math, Compiler & Kernel Infrastructure.

miHoYo / HoYoverse / COGNOSPHERE lib/Analysis

@chainreactors
chainreactors chainreactors
for red team! for offensive infrastructure! for future!
@jart
Justine Tunney jart

Mountain View, CA

@AgibotTech
AgibotTech
以智能机器创造无限生产力

China

@objective-see
Objective-See Foundation objective-see

Objective-See Foundation Hawaii, USA

@EspressoCake
EspressoCake
Somewhere, doing something.
@RowTeam
RowTeam RowTeam
开发各种安全小工具
@ScriptIdiot
James Yeung ScriptIdiot
coding idiot..

Hong Kong

@VelocityRa
Nick Renieris VelocityRa
Emulation, Reverse Engineering, Graphics.

@kryptoslogic Greece

@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.