-
Peking University
- Beijing, China
- scholar.pku.edu.cn/zclfly
Besi S
LLMpsycho
I'm just a coder for fun, like Saitama, suffering from LLM psychosis.
Masteralb Tirane
He Kong
KHenryAegis
The Ph.D. student at the Institute of Information Engineering, Chinese Academy of Sciences
IIE/UCAS Beijing China
GTFOBins
GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.
inclusionAI
inclusionAI
This organization contains the series of open-source projects from Ant Group with dedicated efforts to work towards Artificial General Intelligence (AGI).
Internet Architecture and Security
Internet-Architecture-and-Security
Identify and Address security vulnerabilities within the fundenmental TCP/IP protocols to enhance the overall security of the Internet.
China
FellouAI
FellouAI
Bring a digital companion to every person, on every device.
United States of America
Jonathan Harrison
Raiff1982
Jonathan Harrison (Raiff1982)
Developer | AI Architect | Relentless Innovator
I build what others say can’t be done—then give it away so no one can gatekeep
Raiff's Bits Texas
High Performance Computing Platform of Peking University
PKUHPC
High Performance Computing Platform of Peking University
China
Ihor Stepanov
Ingvarstep
I am excited to develop AI systems for the expenditure of human knowledge.
Knowledgator Engineering Kyiv, Ukraine
Ziru "Ron" Chen
ronch99
ConvAI & NLProc. Ph.D. std at OSU. Was OSU'22.
The Ohio State University Online
Steph
zzzteph
My name is Ivan, or Steph. I do security trainings, researches, and, from time to time, some bughunting, pentests, and other security stuff.
Netherlands
BlueOwlIoC
BlueOwlIoC
BlueOwl IoC is mainly focuses on curating IOCs relating to Threat Actors, Malwares and Campaigns from own Research Findings, contributing to Infosec community.
Internet
ProjectDiscovery
projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
Sliver Armory
sliverarmory
The finest collection of open-source armaments, curated for the aspiring cyberwar profiteer.
PreviousNext