Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View Mortimus's full-sized avatar

Block or report Mortimus

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@tracelabs
Trace Labs Organization tracelabs
We crowdsource OSINT to help find missing people.
@GrapheneOS
GrapheneOS GrapheneOS
Security and privacy focused mobile OS with Android app compatibility. We focus on developing substantial privacy and security improvements.

Toronto, Ontario, Canada

@Mr-Un1k0d3r
Mr.Un1k0d3r Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r

RingZer0 Team

@opnsense
OPNsense opnsense

The Netherlands

@timwhitez
TimWhite timwhitez
Offensive Security Researcher / Vuln Hunter.

@bytedance

@TheManticoreProject
The Manticore Project TheManticoreProject
Crowdsourced open source offensive and defensive security tools, to heighten the security posture of the community as a whole

France

@snovvcrash
snovvcrash snovvcrash
Sr. Penetration Tester / Red Team Operator, author of the Pentester’s Promiscuous Notebook

(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@Alh4zr3d
Alh4zr3d Alh4zr3d
Penetration tester and red teamer with incident response experience, currently hacking for the highest (legal) bidder.

Cyber Security Consulting Firm USA