🥷
-
Adversary Simulation @ IBM X-Force Red
-
IBM X-Force Red Adversary Simulation
- United States
- https://0xBoku.com
- @0xBoku
- in/bobby-cooke
David B.
TH3xACE
Red Team Operator | Purple Team | OSCP | CRTP | CRTO | GPEN | GCIH | CREST CPSA-CRT | CISSP | ISO27001 LA | Next...
@Team B3aT Somewhere on earth
Hossam Ehab
0xHossam
Just another red teamer, but I hack networks with finesse, twist kernels with precision, and dissect malware with obsession.
@darkentryams Egypt
Dylan Tran
susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman
Ex-CPTC & Ex-CCDC @cpp-cyber
IBM X-Force Red Adversary Simulation Building 98C, 4-23: Telco Lab @ CPP
Lorenzo Grazian
looCiprian
Penetration tester and enthusiast developer.
OSCP|OSWE|GPEN|eMAPT|AWS|GCP|GCPN|CISSP
Outflank B.V.
outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response
Amsterdam, Netherlands, EU
realoriginal
Senior Researcher for Cobalt Strike. Account exists as an archaic review of old research for resume purposes.
Nero22k
If your only tool is a debugger, then every problem begins to look like a bug
NSA Fort Meade, Maryland
memN0ps
A security researcher interested in Rust software development and Intel VT-x hypervisors for memory introspection and reverse engineering. @thesecretclub
New Zealand
Sliver Armory
sliverarmory
The finest collection of open-source armaments, curated for the aspiring cyberwar profiteer.
NULL
NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
snovvcrash
snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)
(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻
Luke Roberts
rookuu
Red Teamer | MEng Mathematical Computation, UCL | Interests focused around adversary emulation and macOS.
@github London, UK
Matthew Conway
mattreduce
Threat Detection & Response Engineer, runs Sources & Methods newsletter and blog
@hashicorp and @srcmtd United States
PreviousNext