Skip to content
View Logan-Elliott's full-sized avatar

Block or report Logan-Elliott

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@zodiacon
Pavel Yosifovich zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!

Trainsec.net United States

@atomiczsec
atomiczsec atomiczsec
cxxx|;:;:;:;:;:;:;:;>
@zyn3rgy
Nick Powers zyn3rgy
Adversary Simulation @ SpecterOps

SpecterOps

@WeaponizedVSCode
Weaponized VSCode WeaponizedVSCode
Weaponized VSCode, Make vscode like an offensive security tool to help the hackers, just like a development IDE to developers.

Ireland

@Cobalt-Strike
Cobalt Strike Cobalt-Strike
The official public repository for Cobalt Strike related projects.
@Maldev-Academy
Maldev Academy Maldev-Academy
A learning academy offering module-based offensive security training and resources
@olafhartong
Olaf Hartong olafhartong

@FalconForceTeam The Netherlands

@loosehose
loosehose
Red Team Analyst with a focus of automation, maldev, and evasion.
@RootUp
Dhiraj Mishra RootUp
(!=1337)

Inputzero Planet Earth

@evilashz
evilash evilashz
Offensive Security Research
@M0nster3
M0nster3 M0nster3
Junior Security Researcher

China

@TwoSevenOneT
Two Seven One Three TwoSevenOneT
Security Researcher at https://ZeroSalarium.com || Penetration Tester || Red Teamer || Social Engineering Awareness Trainer
@MatheuZSecurity
MatheuZ MatheuZSecurity
Red Team Operator | Threat Intelligence | Security Researcher | Malware Researcher

Brazil

@andreisss
Andrea Bocchetti andreisss
Into cyber. Blue team, red team, offense — I live for it. Breaking things, defending systems, learning daily. Follow the journey, no fluff, just real-world sec.

@Moon

@CursorTouch
CursorTouch CursorTouch
Let AI do it for you.

India

@toxy4ny
KL3FT3Z toxy4ny
✔ Complex Red Team / Adversarial Simulation operations. ✔ Penetration testing (web, infra, social engineering). ✔ Imitation of APT. Lead of @Hackteam-Red

Hackteam.Red

@Print3M
Print3M
Red Team operator & security research & programming.
@xuanxuan0
Filip Olszak xuanxuan0

Countercept Singapore

@landhb
Bradley Landherr landhb
OSDev & Systems Programming in C & Rust

GPG Key ID: 0x0A767DBDBD99D92B

@matro7sh
matro7ch habibi matro7sh
Pentester tools

127.0.0.1

@EvilWhales
EvilWhale EvilWhales
Owner lab.evilginx.dev x Multilingual developer x Red Team x The founder of the platform CFS x RProxy LAB

@PaloAltoNetworks

@Meowmycks
Meowmycks
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ zzz... ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ /ᐠ_ ꞈ _ᐟ\___ノ
@Kr0ff
Kr0ff Kr0ff

Location Unknown

@joaoviictorti
Victor joaoviictorti
debugging with print

127.0.0.1

@S3lrius
S3lrius S3lrius
all warfare is irregular
@trickster0
trickster0 trickster0
Lead Red Teamer & Malware Dev, Reverse engineering for fun and analyzing Winternals

Greece

@KickedDroid
KickedDroid
Security Researcher | CPTS

Earf

@m0chan
m0chan
https://pentestly.io
@angea
Ange Albertini angea
Reverse engineer, author of Corkami
@Tw1sm
Matt Creel Tw1sm

SpecterOps Washington, DC

@xforcered
X-Force Red xforcered
IBM Corporation and the author is not responsible or liable for any code hosted here or its use cases.
@SpecterOps
SpecterOps SpecterOps

United States of America

@CodeXTF2
CodeX CodeXTF2
Red teamer and offensive dev. I pop shells and play tf2.

in your walls userland

@mgeeky
Mariusz Banach mgeeky
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code

Binary-Offensive.com Poland