Skip to content
View Vincebye's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Block or report Vincebye

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@nccgroup
NCC Group Plc nccgroup
Please report all security issues to security at nccgroup dot com

Global

@advanced-microcode-patching
ELF binary patching technology advanced-microcode-patching
Development of Shiva for DARPA's AMP (Assured Micropatching) program

United States of America

@raminfp
Ramin Farajpour Cami raminfp
Vulnerability Researcher (VR),

Negarkhodro FilterNetLand

@LearningOS
The Learning&Training Hub of OS Kernel LearningOS
the Learning&Training Hub of OS Kernel for Students & Developers

China

@pascal-lab
PASCAL Research Group pascal-lab
Programming Languages and Static Analysis Group@Nanjing University
@SweetVishnya
Alexey Vishnyakov SweetVishnya
PhD in computer security

@yandex-cloud Moscow, Russia

@oliverchang
Oliver Chang oliverchang
Senior Staff SWE on Open Source Security @ Google. Founder of the OSV.dev project, co-founder of OSS-Fuzz.

@google

@Visualize-ML
Iris Series: Visualize Math -- From Arithmetic Basics to Machine Learning Visualize-ML
鸢尾花书:从加减乘除到机器学习; 全套7册。Visualizing Mathematics for Machine Learning. 7 Books. ~6000 vector images. Language: Simplified Chinese 简体中文. Python.
@helloexp
helloexp helloexp
由于众所周知的原因,0day 项目原始仓库被删除,但保留了副本,forks和stars 清零;各位可以重新fork和star【https://github.com/helloexp/0day】
@trailofbits
Trail of Bits trailofbits
More code: binary lifters @lifting-bits, blockchain @crytic, forks @trail-of-forks

New York, New York

@f0rki
Michael Rodler f0rki
Software Security Researcher. I like fuzzers, compilers, binaries, and most of all finding bugs. Currently doing so for AWS.

AWS Cologne, Germany

@ossf
Open Source Security Foundation (OpenSSF) ossf
OpenSSF is a community of software developers and security engineers who are working together to secure open source software for the greater public good.

San Francisco, CA

@trucnguyen10
Truc Nguyen trucnguyen10
Computer Science@DePauwUniversity
@user1342
James Stevenson user1342
Software Engineer and Security Researcher 🤖📱

UK

@AFLplusplus
Advanced Fuzzing League ++ AFLplusplus
We want to make fuzzing better and better

Europe

@ant4g0nist
Chaitanya ant4g0nist
Founder & CEO @ Yokai Network || Vulnerability Researcher || 🦀

Yokai Network Amsterdam

@HexHive
HexHive HexHive
Enforcing memory safety guarantees and type safety guarantees at the compiler and runtime level

Switzerland

@stong
cts stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue. Previously @Vector35, @sslab-gatech.

@Zellic 0x4141414141414141

@areuu
areuu areuu
Exploit/Chrome

Hangzhou

@lcyfrank
cylin lcyfrank
Never forget.

UCAS | NeSE | 0th3rs Beijing, China

@l33d0hyun
Dohyun Lee l33d0hyun

Korea, Republic of

@pventuzelo
Patrick Ventuzelo pventuzelo
CEO & Founder of @FuzzingLabs | Security Researcher. Focused on Fuzzing, Vulnerability Research, Reversing & Binary analysis

FuzzingLabs Paris, France

@andreafioraldi
Andrea Fioraldi andreafioraldi
Writing fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.

Antibes, France

@nedwill
Ned Williamson nedwill
iOS Hacking, formerly 3DS/Chrome Hacking

Google Sunnyvale, CA

@jonathanmetzman
jonathanmetzman
Security engineer working on open source and Chrome security

Google

@googleprojectzero
Google Project Zero googleprojectzero
Projects by Google Project Zero
@sslab-gatech
gts3.org (SSLab@Gatech) sslab-gatech
https://gts3.org

School of Computer Science, Georgia Tech

@MozillaSecurity
Mozilla Fuzzing Security MozillaSecurity
Fuzzing projects at the Mozilla Corporation

Mountain View, Ca

@vul337
VUL337 Group vul337
Research group lead by Prof. Chao Zhang at Tsinghua University, focusing on software security.
@wcventure
Cheng Wen wcventure
I am a lecturer at the Guangzhou Institute of Technology at Xidian University. My research interests are about Trusted & Intelligent Software Engineering.

Xidian University Guangdong Province, China, 518060

@rust-tutorials
Rust Tutorials rust-tutorials
Tutorials for doing stuff in Rust. Contact Lokathor if you want to get started writing something!

Rustopia

@rust-fuzz
Rust Fuzzing Authority rust-fuzz
Tools and resources for fuzzing with the Rust programming language
@ThunderJie
ThunderJie
Windows Kernel | Blackhat 2022 | MSRC 2022 Q3 TOP 100

China