8000 tehstoni / Following · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View tehstoni's full-sized avatar

Block or report tehstoni

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@gsmith257-cyber
gsmith257 gsmith257-cyber
Red Team Operator

@PhantomSecurityGroup

@xpn
Adam Chester xpn
|| RedTeamer and Infosec Researcher ||

SpecterOps UK

@kgretzky
Kuba Gretzky kgretzky
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security.
@KyleEvers
KyleEvers
Pentester. Developer. Public servant at @cisagov.

@cisagov

@kyle41111
kyle hagerman kyle41111
Adversary Simulation @ SpecterOps

SpecterOps Mass

@SnoopJesus420
John Doe SnoopJesus420
The enemy of the pen tester is time and Microsoft Word.

Taco Bell Red Team Anywhere Any Time

@rvrsh3ll
Steve Borosh rvrsh3ll
I hack code together and hope it works.

https://futuresec.io Gamma Quadrant 4

@nicbrinkley
Nick nicbrinkley
I am a Red Team Security Engineer / Pentester who takes a lot of notes. ☕🧑‍💻
@I-Am-Jakoby
I-Am-Jakoby
Ethical Hacker - Artist - Veteran
@boku7
Bobby Cooke boku7
Adversary Simulation @ IBM X-Force Red

IBM X-Force Red Adversary Simulation United States

@WKL-Sec
White Knight Labs WKL-Sec

White Knight Labs USA

@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.
@zyn3rgy
Nick Powers zyn3rgy
Adversary Simulation @ SpecterOps

SpecterOps

@fin3ss3g0d
Dylan Evans fin3ss3g0d
🔓 Master of the virtual heist. Unlocks cyber doors while wearing a white hat. OSEP-certified ethical hacker, converting caffeine ☕ and curiosity 🤔 into code.

United States

@icyguider
icyguider icyguider
It's sipple out there!
@nickvourd
Nikos Vourdas nickvourd
Just your friendly neighborhood APT:~# OSWE | OSEP | OSCP | OSWP | CRTL | CRTO | OASP

Evil Corp Ltd. Chicago, IL, USA

@oldboy21
Vincenzo oldboy21
Offensive Tool Developer with shades of Red and Blue

On a Breeze

@susMdT
Dylan Tran susMdT
Nigerald/NigelGerald/Nigel Gerald/d_tranman Ex-CPTC & Ex-CCDC @cpp-cyber

IBM X-Force Red Adversary Simulation Building 98C, 4-23: Telco Lab @ CPP

@secretsquirrel
midnite_runr secretsquirrel
I laugh in the general direction of security products.
@0xTriboulet
Steve S. 0xTriboulet
Allegedly some kind of researcher
@snovvcrash
snovvcrash snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)

(╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻

@h0useh3ad
Joe Berry h0useh3ad
Security Consultant
@Binary-Offensive
mgeeky | Binary-Offensive.com Binary-Offensive
My private Offensive Security Tooling (OST) shared with InfoSec Professionals & sponsors with aim to improve cyber-resilience against real-world APTs

Poland

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@SonOfABot
Raven SonOfABot
CyberSec Lover, enthusiast, Researcher, Upcoming Pentester, and Security Analyst. if you can teach me, I'll love it
@ghostty-org
Ghostty ghostty-org
A new terminal, started by @mitchellh 👻

United States of America

@t3l3machus
Panagiotis Chartas t3l3machus
Penetration Tester, Cybersecurity Researcher.
@Maldev-Academy
Maldev Academy Maldev-Academy
A comprehensive module-based malware development course providing fundamental to advanced level knowledge
@justcallmekoko
Just Call Me Koko justcallmekoko
I make things. I also make stuff
@mbb5546
Gonski mbb5546
Offsec Consultant
@johndfowler
John Fowler johndfowler

@MHCIS South Carolina, USA

@bloggins
jason m bloggins
Falling over myself trying to figure this stuff out! OSCP/OSCE/RTO.... Still know nothing! Wannabe Maldev
@pr0b3r7
pr0b3r7

@humanaoffsec @Hacker-Hermanos

@pracsec
pracsec

Practical Security Analytics

@bigb0sss
bigb0ss bigb0sss
OSWE | OSCE | OSCP | Principal Security Engineer - Pentest, RedTeam, ExpDev, AppSec, CloudSec, Security Automation/Tooling

\x90\x90

@Synzack
Zach Stein Synzack
Repository for tools and content created from my research.
@MzHmO
Michael Zhmaylo MzHmO
Follow me and check my links!

Russia

@mrexodia
Duncan Ogilvie mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland

@affix
Keiran Smith affix
Penetration Tester and Developer from Scotland

@nable-org Scotland

0