Skip to content
View MHaggis's full-sized avatar
:shipit:
:shipit:

Block or report MHaggis

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@infosecB
Brendan Chamberlain infosecB
Threat Detection Engineer | detection & response | automation | macOS security | awesome-detection-engineering, LOOBins, Rulehound
@patel-bhavin
Bhavin Patel patel-bhavin
Sr. Threat Research Engineer @splunk Threat Research Team. Maintainer, Avid fan - Atomic Red Team

Splunk SF

@BC-SECURITY
BC Security BC-SECURITY
Cybersecurity Engineers and Offensive Security enthusiasts actively maintaining/updating Powershell Empire in our spare time.
@HackingLZ
LZ HackingLZ
This is not the git account you're looking for...mainly backing up public repos.
@nterl0k
Steven Dick nterl0k
I pretend to do DFIR and Detection Engineering
@HotCakeX
Violet Hansen HotCakeX
Physically Thicc, Mentally Sicc | υηƒαzє∂ — 𝙿𝚜𝚊𝚕𝚖 𝟸𝟹:𝟺

@SpyNetGirl Silent Hill

@inodee
Alex Teixeira inodee
https://opstune.com

Independent Contractor EU

@deadbits
Adam Swanda deadbits
AI safety & security, threat intelligence, malware, python
@magicsword-io
MagicSword magicsword-io
Magicsword builds advanced security tools that collect and analyze data to protect businesses from internet threats and malicious actors.

United States of America

@brokensound77
Justin Ibarra brokensound77
Security research and detection engineering

@endgameinc @elastic CO

@terrancedejesus
Terrance DeJesus terrancedejesus
Threat Research and Detection Engineering (TRADE) @elastic

@elastic

@matrosov
Alex Matrosov matrosov
IDAholic, #CodeXplorer, @REhints , "Rootkits and Bootkits" book co-author (http://bootkits.io), Firmware voodoo, and TEE exorcist.

BINARLY Los Angeles CA

@yardenshafir
yardenshafir
A circus artist with a visual studio license

https://windows-internals.com/

@mvelazc0
mvelazco mvelazc0
Mauricio Velazco - Purple Team || Noob
@yugoslavskiy
yugoslavskiy
@atc-project, @oscd-initiative. OSCP, CCNP Security, GCFA, GNFA

Kyiv

@TheCruZ
TheCruZ
Need help? Ask me! 🙌😁 ⚠️ Warning: scammers are using my name. I DON'T SELL ANYTHING. Only trust Discord: TheCruZ#1979

España/Madrid

@MSAdministrator
Josh Rickard MSAdministrator
I like long walks through binary trees, Python & PowerShell riding, writing romantic experiences about code, git prune all branches, and deep sea phishing.

@sublime-security Remote

@gtworek
Grzegorz Tworek gtworek
https://linkedin.com/in/grzegorztworek
@decoderzhub
Darin Josell decoderzhub
I love innovation and collaboration with others follow me!

AR Vibe, LLC Seattle, WA

@kevoreilly
Kevin O'Reilly kevoreilly
Creator of CAPE Sandbox
@timb-machine
Tim Brown timb-machine
push(@github, "Adversarial Engineer"); # i hack in Perl

@CiscoCXSecurity London, United Kingdom

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@rw-access
Ross Wolf rw-access

@sublime-security CO

@EricZimmerman
Eric EricZimmerman
I code stuff! However, this is time consuming! Please consider supporting my work via GitHub sponsors: https://github.com/sponsors/EricZimmerman

ZimTech4n6 Indianapolis

@swisskyrepo
Swissky swisskyrepo
Red Team Operator & Bug Hunter
@jessefmoore
Jesse Moore jessefmoore
Sr. Cybersecurity Advisor @ University of Washington. Interested in teaching Admins about Red Team, Forensics, Detection, and defense/secure configs.

Bothell, WA

@sbousseaden
sbousseaden
Threat Hunting & DFIR
@CptOfEvilMinions
CptOfEvilMinions
https://HoldMyBeerSecurity.com author. CSEC@RIT. Views and opinions are my own.
@mdsecactivebreach
ActiveBreach mdsecactivebreach
MDSec's ActiveBreach Team

@mdsecresearch Ring 0

@olafhartong
Olaf Hartong olafhartong

@FalconForceTeam The Netherlands

@mgreen27
Matthew Green mgreen27
DFIR / Detection guy

Sydney