8000 boku7 (Bobby Cooke) / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View boku7's full-sized avatar
🥷
-
🥷
-

Block or report boku7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@dru1d-foofus
Tyler dru1d-foofus
just hacking all the things, but doing a bad job at it

CDW Roanoke, VA

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@TH3xACE
David B. TH3xACE
Red Team Operator | Purple Team | OSCP | CRTP | CRTO | GPEN | GCIH | CREST CPSA-CRT | CISSP | ISO27001 LA | Next...

@Team B3aT Somewhere on earth

@0xTriboulet
Steve S. 0xTriboulet
Allegedly some kind of researcher
@0xHossam
Hossam Ehab 0xHossam
Just another red teamer, but I hack networks with finesse, twist kernels with precision, and dissect malware with obsession.

@darkentryams Egypt

@0xDeku
Alon Leviev 0xDeku
Security Researcher
10000
@susMdT
Dylan Tran susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman Ex-CPTC & Ex-CCDC @cpp-cyber

IBM X-Force Red Adversary Simulation Building 98C, 4-23: Telco Lab @ CPP

@icyguider
icyguider icyguider
It's sipple out there!
@gabriellandau
Gabriel Landau gabriellandau
WinDbg’er at @elastic security

Elastic Maryland

@looCiprian
Lorenzo Grazian looCiprian
Penetration tester and enthusiast developer. OSCP|OSWE|GPEN|eMAPT|AWS|GCP|GCPN|CISSP
@GhostPack
GhostPack GhostPack
A collection of security related toolsets.
@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@nettitude
LRQA Cyber nettitude
Making the world more secure - one line of code at a time!

United Kingdom

@redr0nin
redr0nin
Principal Red Team Operator & Technical Exploitation Officer
@realoriginal
realoriginal
Senior Researcher for Cobalt Strike. Account exists as an archaic review of old research for resume purposes.
@sfewer-r7
Stephen Fewer sfewer-r7
Principal Security Researcher at Rapid7

@rapid7 Ireland

@Nero22k
Nero22k
If your only tool is a debugger, then every problem begins to look like a bug

NSA Fort Meade, Maryland

@monoxgas
Nick Landers monoxgas

@dreadnode Utah, United States

@Kap0k
Kap0k Kap0k
Kap0k Security Team.

GuangZhou

@kohnakagawa
tsunekoh kohnakagawa
Security Researcher at FFRI Security, Inc.

@FFRI Tokyo, Japan

@SaadAhla
d1rk SaadAhla
Security researcher, malware dev

Morocco

@memN0ps
memN0ps
A security researcher interested in Rust software development and Intel VT-x hypervisors for memory introspection and reverse engineering. @thesecretclub

New Zealand

@knavesec
Ellis Springe knavesec
Penetration tester
@sliverarmory
Sliver Armory sliverarmory
The finest collection of open-source armaments, curated for the aspiring cyberwar profiteer.
@NUL0x4C
NULL NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻

@rookuu
Luke Roberts rookuu
Red Teamer | MEng Mathematical Computation, UCL | Interests focused around adversary emulation and macOS.

@github London, UK

@mattreduce
Matthew Conway mattreduce
Threat Detection & Response Engineer, runs Sources & Methods newsletter and blog

@hashicorp and @srcmtd United States

0