🥷
-
Adversary Simulation @ IBM X-Force Red
-
IBM X-Force Red Adversary Simulation
- United States
- https://0xBoku.com
- @0xBoku
- in/bobby-cooke
David B.
TH3xACE
Red Team Operator | Purple Team | OSCP | CRTP | CRTO | GPEN | GCIH | CREST CPSA-CRT | CISSP | ISO27001 LA | Next...
@Team B3aT Somewhere on earth
Hossam Ehab
0xHossam
just another red teamer but i hack networks with finesse, twist kernels with precision, and dissect malware with obsession
@CyShield Egypt
Dylan Tran
susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman
Ex-CPTC & Ex-CCDC @cpp-cyber
IBM X-Force Red Adversary Simulation Building 98C, 4-23: Telco Lab @ CPP
Lorenzo Grazian
looCiprian
Penetration tester and enthusiast developer.
OSCP|OSWE|GPEN|eMAPT|AWS|GCP|GCPN|CISSP
Outflank B.V.
outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response
Amsterdam, Netherlands, EU
Nero22k
If your only tool is a debugger, then every problem begins to look like a bug
NSA Fort Meade, Maryland
Sliver Armory
sliverarmory
The finest collection of open-source armaments, curated for the aspiring cyberwar profiteer.
NULL
NUL0x4C
Windows Malware Researcher | Seeking Knowledge | co-founder of maldevacademy.com
snovvcrash
snovvcrash
Sr. Penetration Tester / Red Team Operator @ptswarm, author of the Pentester’s Promiscuous Notebook
(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻
Luke Roberts
rookuu
Red Teamer | MEng Mathematical Computation, UCL | Interests focused around adversary emulation and macOS.
@github London, UK
Matthew Conway
mattreduce
Threat Intel Engineer, runs Sources & Methods newsletter and blog
@remitly and @srcmtd United States
PreviousNext