🪁
Entertaiment Never End
Lead Offensive Security Engineer, Principal Consultant, Red Team Operator, GPG Pub: 4096R/E6381EA5 ,
Jabber:[email protected] ,
Torchat:6jyfhrjuievdmzw7 ,
Ismail Tasdelen
ismailtsdln
Hi, My name is Ismail Tasdelen. As a security researcher. Remember to follow and support. Have a great day. 😇
Private Compnay 0x40002000
Mariusz Banach
mgeeky
🔴 Red Team operator.
👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
Binary-Offensive.com Poland
Maldev Academy
Maldev-Academy
A learning academy offering module-based offensive security training and resources
richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ http://fuzzing.io; hacking the planet since 1995; Undercurrents BOFH
Ilya V. Matveychikov
milabs
Linux kernel addict, security researcher, reverse engineer
Russia, Moscow
MatheuZ
MatheuZSecurity
Red Team Operator | Threat Intelligence | Security Researcher | Malware Researcher
Brazil
MD ISMAIL SOJAL
0xSojalSec
Cyber Security Re-searcher | Malware Analysis | AI Re-searcher | Studying OSCP
| Open-source AI,LLM stuff | Post-training / Reasonign Models / RAG | AI Agent
INTERNET
Battal Faik Aktaş
BattalFaikAktas
Cyber Security Researcher | CENG | CEH | OSCP | ACE | eWPTXv2
Istanbul
nullfuzz
nullfuzz-pentest
Nullfuzz a security architect focusing on threat & vulnerability management.
Argentina
Pentest Factory GmbH
pentestfactory
Providing Professional Offensive Security Services
Geldern, Berlin, Frankfurt am Main
Hüseyin TINTAŞ
huseyinstif
I'm Hüseyin TINTAŞ, a full-time Application Security Specialist
[email protected] Turkey
OpenAEV Platform
OpenAEV-Platform
Open Adversarial Exposure Validation Platform
United States of America
come2arkside
come2darkside
RedTeamer @picussecurity | wannabe Gopher | Father of the Luke
@picussecurity Just for Cookie's...
PreviousNext