Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View n0tduck1e's full-sized avatar
🦆
quack
🦆
quack

Block or report n0tduck1e

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@leesh3288
Seunghyun Lee leesh3288
Xion

Carnegie Mellon University Pittsburgh, PA

@virinci
virinci
i can program without relying on llms
@illegal-instruction-co
machinetherapist illegal-instruction-co
pay yok pastanin hepsini pasla

Illegal Instruction Turkey

@ZeroMemoryEx
Mairon ZeroMemoryEx
Cyber Security Consultant | Security Researcher
@mytechnotalent
Kevin Thomas mytechnotalent
Author of the world’s most popular Reverse Engineering Tutorial

Washington, D.C.

@0xeb
Elias Bachaalany 0xeb
** YouTuber ** Author: Batchography ** Co-author: Practical Reverse Engineering & Antivirus Hacker's Handbook.
@alexandreborges
Alexandre Borges alexandreborges
Vulnerability Researcher | Exploit Developer
@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@pedramamini
Pedram Amini pedramamini
Repeat cyber security founder, investor, and advisor. Vibing on @RunMaestro.

Austin, TX

@rush2hell
Rushabh Doshi rush2hell
I am passionate about cyber security related to web apps, IoT security

Mumbai

@torvalds
Linus Torvalds torvalds

Linux Foundation Portland, OR

@therealdreg
Dreg therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher

rootkit.es Spain

@unrooted
unrooted
half criminal, half maverick, all mercenary threat hunter at work, threat maker after hours

@redcode-labs

@netspooky
【☆ ゆう ☆ 】 netspooky
ハートクチュール
@lockedbyte
lockedbyte lockedbyte
exploit dev | @Adepts-Of-0xCC | CTF Player w/ID10Ts
@hkraw
Harsh khuha hkraw
interested in anything about infosec,
@aQuaYi
noname aQuaYi

Wuhan, China

@W3ndige
Karol Trociński W3ndige
Malware Analysis | Reverse Engineering

Poland

@rajatkumar794
Rajat Kumar rajatkumar794
Software Engineer

Flipkart New Delhi

@TROUBLE-1
Raunak TROUBLE-1
Raunak Parmar is an information security professional whose areas of interest include web penetration testing, Azure/AWS security, code review, and scripting.

India

@s0md3v
Somdev Sangwan s0md3v
I create free software, a lot of them.

India

@tomnomnom
TomNomNom tomnomnom
Open-source tool maker, trainer, talker, fixer, eater, not really a sheep. He/him.

Yorkshire, UK

@jhaddix
Jason Haddix jhaddix
Father, hacker, blogger, gamer, & nerd. Bounty Hunter.

United States

@cure53
Cure53 cure53
And there is fire where we walk.

Fine penetration tests for fine websites Berlin

@neddstarkk
Nedheesh Hasija neddstarkk
Just a dummy glued to a computer

Delhi

@deltaxflux
deltax deltaxflux
At the moment busy. Give my best to resolve issues.

Fluxion Somewhere in Germany