Skip to content

Users following backengineering

@Elorucov
Elchin Orujov Elorucov
.NET C# (WPF, UWP and Avalonia) and front-end web developer

Baku, Azerbaijan

@hyperware1337
unknown programmer's programs hyperware1337
Automation in progress

space time

@rogxo
Rog rogxo
C/C++, Reverse Engineering, Disassembly, Windows/Android Internals & Low-level stuff, Exploitations, Penetration Test and more...

Reverse Engineering Co. Ltd. Metaverse

@ahmed605
Ahmed Walid ahmed605
Microsoft Windows Development MVP C#, C++ and UWP developer

@flairmax Egypt

@Hiteke
Hiteke
I am fond of creating programs, websites, and programming controllers. I program in C/C++, C#, as well as JS, Java. 😎
@momo5502
Maurice Heumann momo5502
I used to be an adventurer like you. Then I took a "Violation of Intellectual Property Rights" in the knee.

@thalesgroup

@gmcabrita
Gonçalo Mendes Cabrita gmcabrita
lead engineer @amplemarket

Amplemarket Portugal

@matthewghuang
Matthew Huang matthewghuang

Vancover, British Columbia

@smoonthsky
smoonthsky smoonthsky
robot sdv

hsq metabitverse

@Ramplee
Ramplee Ramplee
IT Student by day, Reverse Engineer by night | Windows kernel, memory dumping, static analysis, obfuscation, virtualization. Always learning.

mov eax Germany

@Manny684
Max Ufer Manny684
Malware Analyst at Fraunhofer @fkie
@su-vikas
Vikas Gupta su-vikas
Security researcher, Reverse Engineering, Obfuscation, Mobile Security
@invalidbug
invalidbug invalidbug
C# and C++ Developer. Mainly commits to proprietary repos.
@enovella
Eduardo Novella enovella
Mobile Security Researcher

undefined

@NeoMaster831
Wane NeoMaster831
Wane-Wein-Wayn

@Porthas-Inc Incheon

@EliteCodexer
R3ave EliteCodexer
Powershell and Ethical Hacking

In a data center somewhere...

@runtimefailure
Kamerzystanasyt runtimefailure
Working on kangarooleaks as of 2016.

@KangarooLeaks Inc /dev/shm

@eternal2056
Eternal eternal2056
Kill rule is my most preference.

None KL