Zathura Debugger
ZathuraDbg
A GUI emulation-based debugger for Assembly Language. Powered by @icicle-emu, @capstone-engine & @keystone-engine
India
EXETOOLS
EXETOOLSNET
Exetools.net is a well-known online forum and community dedicated to reverse engineering, software cracking, and related topics. It serves as a hub for individu
Mythic Agents
MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
Daniele Cono D'Elia
dcdelia
Tenure-track assistant professor at Sapienza University of Rome. Software & systems security
Sapienza University of Rome
vxunderground
The largest collection of malware source code, samples, and papers on the internet.
International
moiji-mobile.com
moiji-mobile
Leading provider of FOSS GSM, 3G, LTE core network components
Amsterdam
Maldev Academy
Maldev-Academy
A learning academy offering module-based offensive security training and resources
rev.ng
revng
We're building the next generation decompiler. Binary analysis is a dish best served static.
Bellingcat
bellingcat
An independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research.
Hacker House
hackerhouse-opensource
Hacker House public computer security research.
hackerhouse 0.0.0.0/0
Mariusz Banach
mgeeky
🔴 Red Team operator.
👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
Binary-Offensive.com Poland
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)
CZE
uCode Research Team
chip-red-pill
Research Team Members:
Dmitry Sklyarov (@_Dmit),
Mark Ermolov (@_markel___),
Maxim Goryachy (@h0t)
Moscow