Skip to content
View Logan-Elliott's full-sized avatar

Block or report Logan-Elliott

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@loosehose
loosehose
Red Team Analyst with a focus of automation, maldev, and evasion.
@RootUp
Dhiraj Mishra RootUp
(!=1337)

Inputzero Planet Earth

@evilashz
evilash evilashz
Offensive Security Research
@M0nster3
M0nster3 M0nster3
Junior Security Researcher

China

@TwoSevenOneT
Two Seven One Three TwoSevenOneT
Security Researcher at https://ZeroSalarium.com || Penetration Tester || Red Teamer || Social Engineering Awareness Trainer
@MatheuZSecurity
matheuz MatheuZSecurity
Red Team Operator | Threat Intelligence | Security Researcher

Brazil

@andreisss
Andrea Bocchetti andreisss
Into cyber. Blue team, red team, offense — I live for it. Breaking things, defending systems, learning daily. Follow the journey, no fluff, just real-world sec.

@Moon

@CursorTouch
CursorTouch CursorTouch
Let AI do it for you.

India

@toxy4ny
KL3FT3Z toxy4ny
✔ Complex Red Team / Adversarial Simulation operations. ✔ Penetration testing (web, infra, social engineering). ✔ Imitation of APT. Lead of @Hackteam-Red

Hackteam.Red

@Print3M
Print3M
Red Team operator & security research & programming.
@xuanxuan0
Filip Olszak xuanxuan0

Countercept Singapore

@landhb
Bradley Landherr landhb
OSDev & Systems Programming in C & Rust

GPG Key ID: 0x0A767DBDBD99D92B

@matro7sh
matro7ch habibi matro7sh
Pentester tools

127.0.0.1

@EvilWhales
EvilWhale EvilWhales
Owner lab.evilginx.dev x Multilingual developer x Red Team x The founder of the platform DSAS by INJECT
@Meowmycks
Meowmycks
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ zzz... ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ /ᐠ_ ꞈ _ᐟ\___ノ
@Kr0ff
Kr0ff Kr0ff

Location Unknown

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@S3lrius
S3lrius S3lrius
all warfare is irregular
@trickster0
trickster0 trickster0
Lead Red Teamer & Malware Dev, Reverse engineering for fun and analyzing Winternals

Greece

@KickedDroid
KickedDroid
Security Researcher | CPTS

Earf

@m0chan
m0chan
https://pentestly.io
@angea
Ange Albertini angea
Reverse engineer, author of Corkami
@Tw1sm
Matt Creel Tw1sm

SpecterOps Washington, DC

@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@SpecterOps
SpecterOps SpecterOps

United States of America

@CodeXTF2
CodeX CodeXTF2
Red teamer and offensive dev. I pop shells and play tf2.

in your walls userland

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland

@k0keoyo
k0shl k0keoyo
Binary vulnerability researcher,focus on Windows & Linux kernel,VM escape and Fuzzing research
@pry0cc
pry0cc pry0cc
Inventor of Axiom

Austin, TX

@p0dalirius
Rémi GASCOU (Podalirius) p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP

Specter Ops France

@outflanknl
Outflank B.V. outflanknl
Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Amsterdam, Netherlands, EU

@vaxerski
Vaxry vaxerski
The lower you go, the more amusing it gets... Just kidding. You'll only go insane.

Acheron, Hades

@techspence
Spencer Alessi techspence
Pentester/sysadmin in rehab | AD Security Connoisseur | @EthicalThreat | Offsec at @SecurIT360 | Host of The Cyber Threat POV

Ethical Threat Bob Ross Mountain Range