Skip to content
View christian-taillon's full-sized avatar
sipping coffee
sipping coffee

Organizations

@Arizona-Cyber-Threat-Response-Alliance @CISO-in-a-Box @Dark-Roast-Cyber

Block or report christian-taillon

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@TheRavenFile
The Raven File TheRavenFile
Official Git Repo of THE RAVEN FILE. Here, you can find useful IOCs observed during my Cyber Investigations.

Internet

@sriting
Jiaren Cai sriting
Head of Developer Community @MiniMax-AI | M.S. @ University of California, Irvine

MiniMax

@nullure
Morven nullure
Developer of OpenMemory & PageLM.

CaviraOSS 127.0.0.1

@behemothsecurity
Behemoth Security behemothsecurity
Detection & Response Engineering Maintainer of @OpenTideHQ , the reference Detection Engineering & DetectionOps framework

Behemoth Security

@VictorTaelin
Victor Taelin VictorTaelin
Functional-programming enthusiast, author of Kind and HVM.

Higher Order Company Rio de Janeiro, Brazil

@aimsopp
Joshua Lyons aimsopp
Newbie Developer in the making!

Phoenix, Arizona

@open-webui
Open WebUI open-webui
On a mission to build the best AI user interface.
@jofpin
Jose Pino jofpin
Security Researcher. I like to solve problems by creating technology.

Earther

@CVEProject
CVE Program CVEProject
The mission of the CVE™ Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@magicsword-io
MagicSword magicsword-io
Magicsword builds advanced security tools that collect and analyze data to protect businesses from internet threats and malicious actors.

United States of America

@modelcontextprotocol
Model Context Protocol modelcontextprotocol
An open protocol that enables seamless integration between LLM applications and external data sources and tools.
@polarityio
Polarity polarityio
Better Decisions Faster
@keithjjones
Keith J. Jones keithjjones
https://drkeithjones.com
@ConnorNelson
Connor Nelson ConnorNelson
kanak. Building @pwncollege.

Arizona State University Tempe, AZ

@protectai
Protect AI protectai
Securing ML

United States of America

@ThePrimeagen
ThePrimeagen ThePrimeagen

CEO Of TheStartup 9th Ring, Vim

@Markofka007
Mark Markofka007
Cybersecurity Student
@corelight
Corelight, Inc. corelight
Corelight is the most powerful network visibility solution for information security professionals, founded by the creators of open-source Zeek.

San Francisco, CA

@BushidoUK
BushidoToken BushidoUK
Security Researcher

@curated-intel

@bjhale
Billy Hale bjhale
Director, Web Development

@grand-canyon-education Cottonwood, AZ

@JG-CTIN
J. Ginn JG-CTIN
Cyber threat analysts, hunters, educators, investors in CTI technologies.

Cyber Threat Intelligence Network, Inc. No. America, Europe, Asia

@pangeacyber
Pangea pangeacyber

United States of America

@mudler
Ettore Di Giacinto mudler
ex-SUSE/Rancher, ex-gentoo, ex-Sabayon, @mocaccinoOS

Italy

@pop-os
Pop!_OS pop-os
An Operating System by System76
@tjbck
Tim Baek tjbck
changing the world, bit by bit

@open-webui localhost

@huggingface
Hugging Face huggingface
The AI community building the future.

NYC + Paris

@justinh-rahb
Justin Hayes justinh-rahb
I'm a sysadmin, not a programmer. Please excuse my terrible coding. I'm not allowed near compilers.

REALTORS(R) Association of Hamilton-Burlington Hamilton, Ontario, Canada

@AsahiLinux
Asahi Linux AsahiLinux
Porting Linux to Apple Silicon Macs
@vxunderground
vxunderground
The largest collection of malware source code, samples, and papers on the internet.

International

@Jbyford89
James Byford Jbyford89
Junior Security Analyst | Cyber Security Professional | TryHackMe Top 2% | Passion for learning Python and Cyber Security.

The Byford Law Firm, PLLC Phoenix, AZ

@thomaspatzke
Thomas Patzke thomaspatzke
Loves to build InfoSec-related tools.

Code published here is private and not affiliated with my employer. Germany

@DHowett
Dustin L. Howett DHowett

@Microsoft St. Louis, MO

@shadsluiter
Shad Sluiter shadsluiter
Software Development and Computer Science professor at Grand Canyon University in Phoenix, AZ. https://www.youtube.com/user/shadsluiter

Grand Canyon University Phoenix, AZ