EvilBytecode
For educational purposes only. Explicit authorization required. No warranties. Author disclaims all responsibility for unauthorized use.
TM. Codepulze Mem
Ari Lotter
arilotter
Hi! I'm a developer specializing in LLMs, WebGL, blockchain tech, Rust, provably fair systems, VR, AR, embedded, and... wait, maybe I don't specialize
@nousresearch Toronto, ON
Paranoid Ninja
paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting
Dark Vortex Last seen in Ring 0. Current Location Unknown
Jevin Sweval
jevinskie
Senior Security Researcher, compilers/optimizations/[de]obfuscation, SCA, program analysis, NFC ninja, HW hacker w/ FPGA hammer. Previously Apple Pay Security.
Lafayette, Indiana
Can Bölük
can1357
Security researcher and reverse engineer.
Interested in Windows kernel development, low-level programming, static program analysis and cryptography.
The Netherlands
Cryakl
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware.
Dietmar Kühl
dietmarkuehl
I got a Mathematik Diplom from TU Berlin in 1997. Since 2006 I'm working as developer at Bloomberg in London working on distributing market data.
Bloomberg LP London
Pavel Yosifovich
zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!
Trainsec.net United States
Ivan Shynkarenka
chronoxor
Cross-platform C++, highload servers, low latency, electronic trading, trading platforms, communication protocols, TCP, UDP, WebSockets, FIX, MT4, MT5.
Duncan Ogilvie
mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
Poland