Mohamed Adil
Mohamed-Adil-Cyber
A malware incident responder with high skills in malware analysis, reverse engineering and assembly coding;
Y11
XiaomingX
Software Dev @ X | Linux, Java, Spring, Python, Go, Next.js | Open Source Enthusiast | LLM Innovator | M.Sc. in Software Engineering 🚀
uhaka japan
Marco Fekry
MarcoFekry
Multi-Cloud Architect \ Consultant 🌐| Cybersecurity Cloud Architect 🔒| Service Delivery Manager | RoboMate Cloud Automation Developer and Owner
Egypt
killvxk
在你面前的是:大宗师,大德鲁伊,屠魔者,死亡领主,大领主,大法师,先知,大祭司,战争领主,虚空领主,狩猎大师,暗影之刃,奈非天,白狼,昆特牌的大师,猎魔人,守望先锋成员,单排吃鸡者。
USSR
Eduardo Robles
eduardo-robles
I’ve been using Linux for 12+ years and I’m just getting good at it. I enjoy writing blog posts, doing videos, and livestreams on all things FOSS.
Rhiannon Williams
researchsecurity
They made 'The Matrix' after my true life stories.
Seattle, Washington
SakaZulu
SakaZulu
I am an assistant professor in Chinese Culture University. My major research focus one computer security and cryptography.
Chinese Culture University Taipei, Taiwan
Vladimír Janout
JanoutV
I am a CTI analyst excited about all things Automation, Collection and Data Processing to make it available in format that drives intel analysis.
@RedHatOfficial
Fabian Mendoza
DFIRDominican
DFIR @ Unit 42, Blogger @ DFIRDominican.com, Threat Hunter, Forensicator, Incident Responder, Husband, Metalhead.
Palo Alto Networks Unit 42 New Jersey
Smith Noorah
NoorahSmith
👋 Hi, I’m @NoorahSmith Purple Teamer and Constant Learner
👀 I’m interested in Web3 and Web2 alike...
🌱 I’m currently learning Rust offensive and Defensive.
@johnny-sch-course Internet
Dennis Labossiere
dllaboss
Manager @ KPMG LLP Cyber Threat Management.
Avid threat hunter and detection engineer.
KPMG LLP New York
Maulvi Alfansuri
maulvialf
Interested in Infosec and Reverse engineering. Play CTF on RE and Binary Exploit.
Indonesia
PreviousNext