John Tear
plackyhacker
I am me... just an amateur malware developer. If you use my code, don't be naughty, keep it legal!!!
Paranoid Ninja
paranoidninja
Brute Ratel Author | Dark Vortex Founder | Ex-Detection Engineering @CrowdStrike | Ex-Red Team/IR @mandiant | Ex-Researcher/Threat Hunter @niiconsulting
Dark Vortex Last seen in Ring 0. Current Location Unknown
Mythic Agents
MythicAgents
A centralized area for installable Mythic Agents based on https://github.com/MythicMeta/Mythic_External_Agent
Bobby Cooke
boku7
Adversary Simulation @ IBM X-Force Red
IBM X-Force Red Adversary Simulation United States
Raul
Raulisr00t
Windows System Programming / Low Level Engineering / Offensive Tool Development
Uriel Kosayev
MalFuzzer
Cybersecurity Researcher | Keynote Speaker | Author of MAoS - Malware Analysis on Steroids & Antivirus Bypass Techniques | Co-Founder
https://trainsec.net
Pavel Yosifovich
zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!
Trainsec.net United States
Helvio Junior (M4v3r1cK)
helviojunior
Malware and Security Researcher | OSCE3 | OSEP | OSED | OSCE | OSCP | OSWE | eCXD | eMAPT | CEH.
@sec4us-training Curitiba, PR, Brazil
Mr.Un1k0d3r
Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r
RingZer0 Team
Zer0verflow
Zeyad-Azima
Offensive Person, who is playing around the core of the 7 layers to build the 0Day Empire.
Malaysia
PreviousNext