Skip to content
View gavz's full-sized avatar

Block or report gavz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@ZathuraDbg
Zathura Debugger ZathuraDbg
A GUI emulation-based debugger for Assembly Language. Powered by @icicle-emu, @capstone-engine & @keystone-engine

India

@EXETOOLSNET
EXETOOLS EXETOOLSNET
Exetools.net is a well-known online forum and community dedicated to reverse engineering, software cracking, and related topics. It serves as a hub for individu
@massgravel
MASSGRAVE massgravel
People researching Microsoft Windows activation services.
@MythicAgents
Mythic Agents MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
@eversinc33
eversinc33 eversinc33

Check Point Research Vienna

@RangeNetworks
Range Networks RangeNetworks
Open Source Cellular Infrastructure

Santa Clara, California

@dcdelia
Daniele Cono D'Elia dcdelia
Tenure-track assistant professor at Sapienza University of Rome. Software & systems security

Sapienza University of Rome

@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@moiji-mobile
moiji-mobile.com moiji-mobile
Leading provider of FOSS GSM, 3G, LTE core network components

Amsterdam

@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@revng
rev.ng revng
We're building the next generation decompiler. Binary analysis is a dish best served static.
@bellingcat
Bellingcat bellingcat
An independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research.
@hackerhouse-opensource
Hacker House hackerhouse-opensource
Hacker House public computer security research.

hackerhouse 0.0.0.0/0

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@trailofbits
Trail of Bits trailofbits
More code: binary lifters @lifting-bits, blockchain @crytic, forks @trail-of-forks

New York, New York

@PentHertz
PentHertz PentHertz
RF and Hardware security company

Paris

@DarkFlippers
Unleashed Firmware Team DarkFlippers
Alternative software for Flipper
@Dump-GUY
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)

CZE

@cn0xroot
HackSmith cn0xroot
大头 大头 下雨不愁

null 127.0.0.1

@RUB-SysSec
Chair for Sys­tems Se­cu­ri­ty RUB-SysSec

Ruhr University Bochum Bochum, Germany

@chip-red-pill
uCode Research Team chip-red-pill
Research Team Members: Dmitry Sklyarov (@_Dmit), Mark Ermolov (@_markel___), Maxim Goryachy (@h0t)

Moscow

@samyk
samy kamkar samyk
explo(r|it)ing boundaries

los angeles

@vmcall
vmcall

@thesecretclub