Skip to content
View d01a's full-sized avatar

Block or report d01a

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@Coldzer0
Coldzer0 Coldzer0
Malware 🕶 Offensive Tools Developer 😎 Reverse Engineer 🐉
@LaurieWired
LaurieWired
Reverse engineer specializing in cross-platform malware analysis with a focus on mobile threats.
@c3rb3ru5d3d53c
c3rb3ru5 c3rb3ru5d3d53c
μηςεηsοяεδ мαℓωαяε яεsεαяςнεя sταηδιηg gμαяδ ατ τнε gατεs οƒ мαℓωαяε нεℓℓ

66.66.66.66

@NUL0x4C
NULL NUL0x4C
Windows Malware Researcher | co-founder of maldevacademy.com
@Washi1337
Washi Washi1337
Hello I am scrub

McMurdo Station, Antarctica

@ionescu007
Alex Ionescu ionescu007
CTIO at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.windows-internals.com

Winsider Seminars & Solutions Inc.

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@psifertex
Jordan psifertex

@Vector35 Melbourne, FL

@Midi12
Midi12
Software engineering consultant at day, hobbyist reverse engineer at night

France

@JustasMasiulis
Justas Masiulis JustasMasiulis
Solving life problems with templates

San Francisco Bay Area

@momo5502
Maurice Heumann momo5502
I used to be an adventurer like you. Then I took a "Violation of Intellectual Property Rights" in the knee.

@thalesgroup

@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@byt3bl33d3r
Marcello byt3bl33d3r
T H I C C M A L W A R E

Palo Alto Networks Error: Unable to resolve

@AhmedSoliman
Ahmed Farghal AhmedSoliman
I build and break things for fun and profit!

@restatedev London, UK

@ahmedaliv
Ahmed Mohamed ahmedaliv
Software Engineer | Web Specialist @reworkd
@memN0ps
memN0ps

New Zealand

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@ufrisk
Ulf Frisk ufrisk
IT-Security Minion

Sweden

@ElektroKill
ElektroKill ElektroKill
19-year-old self-taught developer and reverse engineer. My preferred language of choice is C#.

Netherlands

@itm4n
Clément Labro itm4n
Pentest & Windows security research
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@jschicht
Joakim Schicht jschicht
Researcher and Forensic Analyst

Norway, Bergen

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@Neo23x0
Florian Roth Neo23x0
#DFIR #Sigma #YARA #Rust #Python #Go

@NextronSystems Frankfurt, Germany

@tsale
Kostas tsale
Coding mostly for threat hunting, threat intelligence, and detection engineering.

Mars

@SinaKarvandi
Sina Karvandi SinaKarvandi
Windows internals enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@Ana06
Ana María Martínez Gómez Ana06
Reverse Engineer @google

@google @mandiant Germany

@stevemk14ebr
Stephen Eckels stevemk14ebr
I do security work and build things for fun.

0177.0x001:80

@RussianPanda95
RussianPanda RussianPanda95
Senior Threat Intelligence Researcher | Malware Addict | Threat Hunter

TRAC Labs The United States

@dr4k0nia
drakonia dr4k0nia
Security Researcher specializing in .NET malware analysis and tooling

Schweiz

@Idov31
Ido Veltzman Idov31
I'm a security researcher and using this platform to share my projects and research :)

mov rax, [rbp+location]

@mr-tz
Moritz mr-tz

FLARE/Mandiant Germany

@nasbench
Nasreddine Bencherchali nasbench
Wanna be detection engineer

@cisco-sbg @Splunk @SigmaHQ @magicsword-io HAL

@williballenthin
Willi Ballenthin williballenthin
/usr/bin/nethack

@HexRaysSA

@vtil-project
VTIL Project vtil-project
VTIL (Virtual-machine Translation Intermediate Language) Project is a set of tools that can be used for binary deobfuscation and devirtualization.