Skip to content
View bmax121's full-sized avatar
  • China
  • 08:12 (UTC +08:00)

Block or report bmax121

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@5ec1cff
5ec1cff
A pink star studded with a sapphire fell to the "starry"

NJUPT

@yujincheng08
LoveSy yujincheng08
HKUST@[email protected] student ZJU@CS@Bachelor

Zhejiang University Hong Kong

@AndroidPatch
APatch AndroidPatch
The next generation of Android ROOT with Kernel Patch Module supporting.

China

@pomelohan
1f2003d5 pomelohan
Just a college student in China. A Lazy C/C++ & Java Learner, Kernel Hacker, Android Developer and n๑๑b

SLU Henan, China

@ponces
Alberto Ponces ponces
Husband of Rita. Father of Luke and Simon. Fan of Android, Flutter and Linux. There is no place like /home 🤓

@criticalmanufacturing Porto, Portugal

@Admirepowered
Admire Admirepowered
CN/EN/JA (Chinese native) Reverse engineering player

anheng Chengdu

@SeeFlowerX
SeeFlowerX SeeFlowerX
从人海走到你面前,然后离开。

China

@colordancer
colordancer colordancer
Give before Take.

Beijing, China

@PitchBlackRecoveryProject
PitchBlack Recovery Project PitchBlackRecoveryProject
Open-Source Android Recovery Project

Universe

@P4nda0s
PandaOS P4nda0s
Rust / Security / Binary / Syclover / Nu1L

Chengdu

@remote-android
remote-android
multi-arch GPU accelerated AiC (Android in Cloud) solution
@kubo
Kubo Takehiro kubo
久保健洋

Japan

@black-binary
Black Binary black-binary
Reverse-Engineering/CTF Player C/C++/Rust/Go Dev

@Tencent Shanghai

@triton-library
triton-library
A dynamic binary analysis library.
@HikariObfuscator
Hikari HikariObfuscator
Let there be light.

/dev/kmem

@Wunkolo
Wunk Wunkolo
Hi! I'm Joey

Riot Games California

@AlexAltea
Alexandro Sanchez AlexAltea
Security, reversing, mathematics. Writing emulators and hypervisors.

Astral Technologies Les Escaldes, Andorra

@g0dA
L_AnG g0dA
起点,网易云,番茄签约作者 主写武侠,西幻

SHEIN INC. NanJin. China.

@zardus
Yan Shoshitaishvili zardus
Former DEFCON CTF org. Captain Emeritus, @shellphish. Assoc Professor in Cybersecurity at @ASU. Director, American Cybersecurity Education Inst. @angr hacker.

Tempe, AZ, USA

@toshipiazza
Toshi Piazza toshipiazza
Security engineer at Microsoft, member of @RPISEC.

Microsoft

@oleavr
Ole André Vadla Ravnås oleavr

@nowsecure Stavanger, Norway

@rhelmot
Audrey Dutcher rhelmot
PhD student doing binary analysis, CTF player with Shellphish, founder at Emotion Labs

Emotion Labs Phoenix, AZ

@FrenchYeti
FrenchYeti FrenchYeti
Software Security Researcher

Reversense France

@torvalds
Linus Torvalds torvalds

Linux Foundation Portland, OR

@xiaokanghub
xkang xiaokanghub
Reverse Engineering
@nu11secur1ty
nu11secur1ty nu11secur1ty
System Administrator IT infrastructure Engineer C, Perl, Python & Bash developer. Social engineering security consultant. Penetration Testing Engineer
@FeeiCN
Feei FeeiCN
Security Researcher

Alipay Hangzhou, China

@iosre
iOSRE iosre
Things about iOS Reverse Engineering

China

@pcy190
HAPPY pcy190
Randomized Researcher

ZJU /etc/shadow

@evilpan
evilpan evilpan
explore, exploit, expose!

An7 Homeless

@wkunzhi
Zok wkunzhi
Action is the key to all success

ChongQing

@hluwa
葫芦娃 hluwa
端茶送水扫地擦窗浇花喂鱼保洁通马桶拔网线

China, Swatow