Skip to content
View werdhaihai's full-sized avatar

Block or report werdhaihai

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@pard0p
pard0p
“Honor is dead, but I’ll see what I can do”

Valencia

@JimSycurity
Jim Sykora JimSycurity
I do Active Directory & Identity security stuff for a living.
@NioZow
NioZ NioZow
Student

Synacktiv In a far away galaxy

@rtecCyberSec
r-tec Cyber Security rtecCyberSec
reframe your readiness

Germany

@vletoux
vletoux
Security ninja trying to do on the CISO side what red teamers do for years (you know me for dcsync, setntlm, DCShadow & pingcastle)

Ping Castle France

@MEhrn00
Matt Ehrnschwender MEhrn00
Some development but mainly CTFs
@hugsy
crazy hugsy hugsy
Exploit Dev & OffSec Tool Dev

@blahcat Ring0

@monoxgas
Nick Landers monoxgas

@dreadnode Utah, United States

@thiagomayllart
Thiago Mayllart thiagomayllart
- Information Security Researcher / RedTeam
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@objective-see
Objective-See Foundation objective-see

Objective-See Foundation Hawaii, USA

@deepinstinct
Deep Instinct deepinstinct
Deep Instinct's Research Team
@0xHossam
Hossam Ehab 0xHossam
Red team operator who can make computers do very bad stuff :)

@CyShield Egypt

@wh0amitz
WHOAMI wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation

nt authority\system Earth

@zimnyaa
zimnyaa
рабів до раю не пускають
@antonioCoco
antonioCoco
@splinter_code | offensive security - windows internals - reverse engineering

Italy

@djhohnstein
Dwight Hohnstein djhohnstein
IBM X-Force Red. Kali Contributor.

@xforcered Seattle, WA

@BlackSnufkin
BlackSnufkin BlackSnufkin
Red-Teamer & Malware Dev | CRTL
@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@SteveSyfuhs
Steve Syfuhs SteveSyfuhs
Authentication and stuff.

@Microsoft

@un4ckn0wl3z
unacknowledged un4ckn0wl3z
Wannabe solid coder in the era of Vibe Coders

Bangkok, Thailand

@SpecterOps
SpecterOps SpecterOps

United States of America

@dreadnode
dreadnode dreadnode
AI Red Teaming | Research. Tooling. Evals. Cyber range.
@S4ntiagoP
Santi S4ntiagoP
🇦🇷

MDSec Metaverse

@fkasler
fkasler

SpecterOps Raleigh NC

@zcgonvh
zcgonvh zcgonvh
Window and .net
@subat0mik
Duane Michael subat0mik
Security Research @ SpecterOps

@specterops San Diego

@Mayyhem
Chris Thompson Mayyhem
Senior Security Researcher @ SpecterOps

@SpecterOps

@garrettfoster13
unsigned_sh0rt garrettfoster13
Security Researcher at @SpecterOps

SpecterOps