offline
Highlights
Josh Stroschein
jstrosch
Reverse Engineer @ FLARE/Google. Content creator on YouTube/Pluralsight
M9 Cyber United States
Mariusz Banach
mgeeky
🔴 Red Team operator.
👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
Binary-Offensive.com Poland
Bobby Cooke
boku7
Adversary Simulation @ IBM X-Force Red
IBM X-Force Red Adversary Simulation United States
Andreas Pardeike
pardeike
Enterprise Architect and Lead Developer iOS at the Swedish Police Authority. Software developer since 1984
Swedish Police Authority Stockholm, Sweden
Pavel Yosifovich
zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!
Trainsec.net United States
ElektroKill
ElektroKill
19-year-old self-taught developer and reverse engineer. My preferred language of choice is C#.
Poland
Jesse Duffield
jesseduffield
Creator of lazygit, lazydocker, horcrux, and the OK? language
Melbourne
Dump-GUY
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)
CZE
Joshua Wright
joswr1ght
Professional hacker. Accidental educator. Rhode Island is not an island.
Providence, Rhode Island, USA
Francesco Soncina
phra
OSCE // OSCP // Ethical Hacker & Red Teamer // Full Stack Developer // JavaScript Enthusiast //
Staff Member of @BolognaJS // CTF player at @d0nkeys
@d0nkeys @BolognaJS Amsterdam, NL
PreviousNext