Skip to content
View SaadAhla's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.
  • Morocco

Sponsors

@djalal

Block or report SaadAhla

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@DarkWebInformer
Dark Web Informer DarkWebInformer
A solo operation pulling threat intel from the dark web, deep web, and clearnet. Tracking breaches, ransomware, darknet markets, exploits, and emerging threats.
@Kudaes
Kurosh Dabbagh Escalante Kudaes
nt authority\kurosh

Madrid

@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@r0keb
Ö r0keb
Low level enthusiast
@rogxo
Rog rogxo
C/C++, Reverse Engineering, Disassembly, Windows/Android Internals & Low-level stuff, Exploitations, Penetration Test and more...

Reverse Engineering Co. Ltd. Metaverse

@nu1lptr0
Abhishek Kumar Singh nu1lptr0
OnlyWindows

Qualcomm Bangalore,India

@abhisek
Abhisek Datta abhisek
Platform & Security Engineer @safedep @boringtools

@safedep Bangalore, India

@winterknife
winterknife winterknife
low-level developer with a focus on 𝙸𝚗𝚝𝚎𝚕 𝚡𝟾𝟼 ISA devices running 𝚆𝚒𝚗𝚍𝚘𝚠𝚜

Coruscant

@matrosov
Alex Matrosov matrosov
IDAholic, #CodeXplorer, @REhints , "Rootkits and Bootkits" book co-author (http://bootkits.io), Firmware voodoo, and TEE exorcist.

BINARLY Los Angeles CA

@thesecretclub
secret club thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
@zerozenxlabs
ZeroZenX Labs zerozenxlabs
ZeroZenX, your trusted destination for cutting-edge 0day acquisition solutions.

@ZeroZenX Dubai

@soufianetahiri
Soufiane Tahiri soufianetahiri
Breaking things since 1999

@soufianetahiri France

@UncleJ4ck
Sc4r3Cr0w UncleJ4ck
Building and Breaking Stuff

The Farm

@JohnLaTwC
John Lambert JohnLaTwC
@JohnLaTwC Security Fellow and Corporate Vice President, Microsoft Security

Microsoft Corporation

@mbenlmaoujoud
Benlmaoujoud Mohamed mbenlmaoujoud
Security Engineer | 3LK

Henceforth

@DarkSpaceSecurity
Dark Space Security DarkSpaceSecurity
Emulating Threats, Enhancing Security: Dark Space Security
@ayoubfaouzi
Ayoub Faouzi ayoubfaouzi
Reverse engineering, windows internals, and hypervisors.
@0xDeku
Alon Leviev 0xDeku
Security Researcher
@0Dr3f
0Dr3f 0Dr3f
Security Researcher
@AzAgarampur
Arush Agarampur AzAgarampur
I enjoy Windows internals, low-level development, reverse engineering, and offensive security

California

@BerkanYildiz
BerkanYildiz
French, 27 years old, PHP/.NET/C/C++/Windows Kernel development.

@Swayor France, Paris

@TheCruZ
TheCruZ
Need help? Ask me! 🙌😁 ⚠️ Warning: scammers are using my name. I DON'T SELL ANYTHING. Only trust Discord: TheCruZ#1979

España/Madrid

@TETYYS
tetyys TETYYS
THERE IS NEVER TOO MUCH SECURITY

MSP™©® tetyys

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@safe6Sec
safe6 safe6Sec
script kiddie

home kunming,China

@torvalds
Linus Torvalds torvalds

Linux Foundation Portland, OR

@JonathanSalwan
Jonathan Salwan JonathanSalwan
Program analysis, reverse engineering and vulnerability research

France

@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@zlockard
Zac Lockard zlockard
Microsoft Dev Plug and Play, Drivers

@Microsoft

@PeterGV
PeterGV

OSR Manchester, NH USA