Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View R1perXNX's full-sized avatar
  • Italy

Block or report R1perXNX

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@GetRektBoy724
Hannn GetRektBoy724
just another weird kid messing with computers. Working at @websec.

Indonesia

@websec
WebSec OST websec
WebSec Offensive Security Team

Netherlands

@noahware
noahware noahware
C/C++ Developer
@Cr4sh
Dmytro Oleksiuk Cr4sh
😈 zero-fucks-given infosec research | info: 🔗 keybase.io/d_olex
@0AVX
0AVX
I’m a developer who is passionate about software development, software security, and reverse engineering.
@ekknod
ekknod ekknod
Anti-Cheat developer for ekknod.xyz

ekknod.xyz Finland

@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@CR3Swapper
IDontCode CR3Swapper
While you sleep we work

Back Engineering Labs, Inc

@backengineering
Back Engineering Labs backengineering
A small research team with big dreams.

United States of America

@plowsec
volodya plowsec
I am a stegosaurus. static program analysis, (de-) obfuscation, LLVM...

Bugscale

@zeze-zeze
Zeze zeze-zeze

TeamT5 Taiwan

@eversinc33
eversinc33 eversinc33

Check Point Research Vienna

@laserunimi
Laser laserunimi

Computer Security laboratory @ Unimi Milan, Italy

@loweege
loweege
MCS - Computer Science and Engineering at TU/e Eindhoven University of Technology🎓

Eindhoven University of Technology (TU/e) Eindhoven - Netherlands

@vtil-project
VTIL Project vtil-project
VTIL (Virtual-machine Translation Intermediate Language) Project is a set of tools that can be used for binary deobfuscation and devirtualization.
@tandasat
Satoshi Tanda tandasat
Engineer and trainer

Vancouver, Canada

@VoidSec
Paolo Stagno VoidSec
Vulnerability Researcher & Exploit Developer

VoidSec ntoskrnl.exe

@vmcall
vmcall

@thesecretclub

@stuxnet147
stuxnet147
replace the text to a seahorse emoji
@Broihon
Broihon Broihon
"I'd like to think oysters transcend national barriers." ~ Roger Waters (1972)

Broihon Broihon

@iPower
iPower iPower
Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @thesecretclub.

Mom's basement

@can1357
Can Bölük can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.

The Netherlands

@DispatchCode
Marco Crivellari DispatchCode
Linux L3 Support Engineer @SUSE

@SUSE Italy

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@Imnotevensparta
Imnotevensparta
Low Level Programming & Full Stack Web Development