Skip to content

Users following Impalabs

@LameCrow
LameCrow LameCrow

UESTC ChengDu, SiChuan

@tuo4n8
$4D tuo4n8
✈🪂✈

VN

@Sndav
Sndav Bai Sndav
Working at Tencent Xuanwu Lab, Focusing on RedTeam. Former CTFer at Dubhe

Tencent Xuanwu Lab Shanghai, CHINA

@khauta
Khauta Maliehe khauta
Normal Software Engineer, Cyber Security Enthusiast

@Liparola Maseru, Lesotho

@0xsunsama
0xsunsama 0xsunsama
一只小菜鸡

Beijing

@Jack2
JAEKI KIM Jack2
All is well +_+

S2W Lab - TALON Republic of Korea

@spiderman001
ludo spiderman001
Embedded Software Engineer

ShenZhen China

@Edward-L
Edward-L Edward-L
Vidar-Team.Symbolic-Execution.FUZZING

@vidar-team

@angeldebone
Angel Debone angeldebone
Newbie in the coding cosmos, venturing into the world of programming to unravel its mysteries. Embracing the challenge, one line of code at a time. 🚀

Sao Paulo, Brazil

@SpiralBL0CK
kn0 SpiralBL0CK
A simple beginner programmer.
@agnosticlines
agnosticlines
reverse engineering, program analysis and exploit dev | i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects

[object Object] /dev/kmem

@guillaumededrie
Guillaume Dedrie guillaumededrie
Cyber Security software developer.
@EXHades
EXHades
Just a “haughty” Stargazer

Gensokyo

@SecFathy
Mohammed Fathy SecFathy
Security Engineer

@squnity Egypt,Cairo

@giglf
giglf giglf
A bin idiot retired from @NeSE-Team

Student China

@yunaranyancat
M Zulfiqar W yunaranyancat
Script Kiddie :trollface: Red Teamer 🔴 (half purple) 🟣 Penetration Tester 💻 trying to make a living by hacking 👴
@bb33bb
boy1337 bb33bb
Majoring in Civil Engineering & English as Vulnerability researcher.

russia

@ykankaya
y.kankaya ykankaya
I'm a primitive living form from earth planet

Entropy Creative Earth Planet

@frite
Manolis M. frite
(In)security engineer. Department of Advanced Excel Weaponization.

NaN The internetz

@reloc2
reloc2 reloc2
你若慕名而来,定会失望而归。

Metaverse Hangchow

@DoubleMice
liangzhihao DoubleMice
baby insecurity researcher, focus on security boot and android kernel, interested in vm and protocol exploit.
@bernsteining
bernsteining bernsteining
i want to learn what to write rather than where to click
@sferrini
Simone Ferrini sferrini
Security Researcher. Interested in RE, fuzzing, hardware and low-level binary stuff. Occasional CTF player.

Undisclosed EL2