boku7
Follow
🥷
-
Adversary Simulation @ IBM X-Force Red
-
IBM X-Force Red Adversary Simulation
- United States
- https://0xBoku.com
- @0xBoku
- in/bobby-cooke
Lorenzo Grazian
looCiprian
Penetration tester and enthusiast developer.
OSCP|OSWE|GPEN|eMAPT|AWS|GCP|GCPN|CISSP
Outflank B.V.
outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response
Amsterdam, Netherlands, EU
Austin Hudson
realoriginal
Professional Inquiries: austinhudson@protonmail.ch.
Cobalt Strike Research & Development Team
Nero22k
If your only tool is a debugger, then every problem begins to look like a bug
NSA Fort Meade, Maryland
Sliver Armory
sliverarmory
The finest collection of open-source armaments, curated for the aspiring cyberwar profiteer.
NULL
NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
snovvcrash
snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)
(x(x_(x_x(O_o)x_x)_x)x)
Luke Roberts
rookuu
Red Teamer | MEng Mathematical Computation, UCL | Interests focused around adversary emulation and macOS.
@github London, UK
X-Force Red
xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
PreviousNext