Skip to content
View BorjaMerino's full-sized avatar

Block or report BorjaMerino

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@Antelox
@Antelox Antelox
Threat Researcher - Malware Analyst - OSINT
@Cryakl
Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@0xDeku
Alon Leviev 0xDeku
Security Researcher
@eversinc33
eversinc33 eversinc33

Check Point Research Vienna

@oldboy21
Vincenzo oldboy21
Offensive Tool Developer with shades of Red and Blue

On a Breeze

@sairson
SaiRson sairson
#PenTest | #RedTeam | #Student | #Universe dev (Current)

Universe/v2

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@ElliotKillick
Elliot Killick ElliotKillick
Security engineer and researcher. Avid developer. Infosec aficionado

Application Security Engineer Toronto, Canada

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@SinaKarvandi
Sina Karvandi SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@0xTriboulet
Steve S. 0xTriboulet
Allegedly some kind of researcher
@JPCERTCC
JPCERT Coordination Center JPCERTCC
JPCERT/CC's official repositories maintained by staff and guests

Tokyo, Japan

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@Te-k
Tek Te-k
Hacking things here and there, mostly threat intel, osint, malware analysis and human rights

Toulouse, France

@Idov31
Ido Veltzman Idov31
I'm a security researcher and using this platform to share my projects and research :)

mov rax, [rbp+location]

@ton-blockchain
TON - The Open Network ton-blockchain
The next gen network to unite all blockchains and the existing Internet
@rootkovska
Joanna Rutkowska rootkovska
Distrusts computers.

Warsaw, Poland

@dmchell
Dominic Chell dmchell
@MDSecLabs @domchell

MDSec UK

@huntandhackett
Hunt & Hackett huntandhackett

Hunt and Hackett Netherlands

@icyguider
icyguider icyguider
It's sipple out there!
@rad9800
rad9800

DeceptIQ UK

@waawaa
Alejandro Pinna waawaa
Offensive Security Researcher at SentinelOne

Madrid, Spain

@janoglezcampos
Yxel janoglezcampos
:P

Vigo, Galicia, Spain

@kero99
KeRo99 kero99

Alpine Security Madrid (Spain)

@bats3c
batsec bats3c

@MDSecactivebreach UK

@wavestone-cdt
Wavestone - Cybersecurity & Digital Trust wavestone-cdt
Projects from the auditors and consultants from Wavestone's Cybersecurity & Digital Trust practice

Wavestone

@pabloambite
Pablo Ambite pabloambite
Programmer of fortune
@paranoidninja
Paranoid Ninja paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting

Dark Vortex Last seen in Ring 0. Current Location Unknown

@30vh1
Marcos Carro 30vh1
Sometimes I code things :D
@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland