Skip to content
View monitor403's full-sized avatar
🎯
JUST DO
🎯
JUST DO

Block or report monitor403

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@steipete
Peter Steinberger steipete
Came back from retirement to mess with AI. Previously: Founder of @PSPDFKit.

Full-Time Open-Sourcerer Vienna & London

@coze-dev
coze-dev
Next-generation AI chatbot building platform. Quickly create bots without coding and publish them on various platforms
@vmayoral
Víctor Mayoral Vilches vmayoral
Roboticist. AI and security researcher.

Alias Robotics Vitoria, Spain

@zTrix
Wenlei Zhu zTrix
Hack the planet!

@chaitin Beijing, China

@rasbt
Sebastian Raschka rasbt
AI Research Engineer working on LLMs.
@NHAS
NHAS
Howdy, you like random golang & security stuff? You've found the right place.
@ehsandeep
Sandeep Singh ehsandeep
Co-Founder / CTO @projectdiscovery On a mission to simplify the security process and make it more accessible.

@projectdiscovery India

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@JSREI
JSREI(JavaScript Reverse Engineering Infrastructure) JSREI
提供更多更好的JS逆向工具,让JS逆向变得简单。 招聘维护人员和开发人员,有兴趣请发邮件给我

China

@ffffffff0x
ffffffff0x
由多名治疗脱发问题的专家组成的新时代治秃团队,简称复头者联盟。

CN

@projectdiscovery
ProjectDiscovery projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
@HarmJ0y
Will Schroeder HarmJ0y
Researcher @SpecterOps. Coding towards chaotic good.

SpecterOps Seattle, WA

@RicterZ
Ricter Zheng RicterZ
uid=1337(ricter) groups=1001(hacker),1002(acg),1003(security)

Independent Security Researcher

@neargle
neargle neargle
🌱 资深“安全从业焦虑”研究员 | RedTeam | Cloud Native | @cdk-team | @opensec-cn

e-mail: neargle@vulhub.org

@KeenSecurityLab
KeenSecurityLab
Keen Security Lab of Tencent, transformed from well-known security research team Keen Team.
@LoRexxar
LoRexxar LoRexxar
QAX TianGong Team/Vidar-Team
@pmiaowu
P喵呜 pmiaowu
尊敬的黑客,您好,您当前浏览的是国家一级保护废物,P喵呜-PHPoop,请文明观看,请勿投食╰(*°▽°*)╯
@4ra1n
4ra1n 4ra1n
Java Security Researcher, Contributors of chaitin/xray vulnerability scanner, vulhub and java-chains, Creator of jar-analyzer and class-obf project.
@su18
素十八 su18
你救赎的人 终将成为你的光

Beijing

@mhaskar
Askar mhaskar
I write codes that break codes, Hacker wannabe.

Between Lines

@r0ysue
r0ysue
またあした
@bit4woo
bit4woo bit4woo
Creating with coding,Learning by doing,Learning by sharing!

shenzhen

@easychen
Easy easychen

ft07.com Chongqing, China

@CTF-MissFeng
cq-feng CTF-MissFeng
网络安全爱好者
@gwen001
Gwendal Le Coguic gwen001
Bug hunter, tool maker.

Paris - France

@samratashok
Nikhil "SamratAshok" Mittal samratashok
Founder of Altered Security, Hacker, InfoSec Professional, PowerShell and AD pwner, Creator of Kautilya and Nishang :)

Altered Security

@driverxdw
driverxdw driverxdw
Binary, Linux-kernel, Hids, Infomation-security-researcher

Shein NJ

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@EtherDream
EtherDream EtherDream
A Web Hacker & Geeker

[object Location]

@chensem
chensem chensem
talk is cheap , show me your code

NanJing JiangSu

@imagemlt
Image imagemlt

@Bytedance Nanjing,Jiangsu,China

@Rvn0xsy
倾旋 Rvn0xsy
Security engineer and researcher. Avid developer. Infosec aficionado

everywhere

@zu1k
zu1k zu1k
A boy dreaming of traveling around the world.
@Bypass007
Bypass007 Bypass007
专注于网络安全

Xiamen, China

@zer0yu
z3r0yu zer0yu
BugHunter@OverSpace / RedTeamer@PolarisLab / CTFer@kn0ck

Singapore / China