WHOAMI
wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation
nt authority\system Earth
Pavel Yosifovich
zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses!
Trainsec.net United States
EvilBytecode
For educational purposes only. Explicit authorization required. No warranties. Author disclaims all responsibility for unauthorized use.
TM. Codepulze Mem
Bobby Cooke
boku7
Adversary Simulation @ IBM X-Force Red
IBM X-Force Red Adversary Simulation United States
Nikos Vourdas
nickvourd
Just your friendly neighborhood APT:~# OSCE3 | OSCP | OSWP | CRTL | CRTO | OASP
Evil Corp Ltd. Chicago, IL, USA
UserX
GeorgePatsias
Breaking stuff until they work (̿▀̿ ̿Ĺ̯̿̿▀̿ ̿)̄
Offensive Security Engineer | OSEP | Computer Scientist | Pentester | Malware Developer | Fullstack Dev
Kernel
Mariusz Banach
mgeeky
🔴 Red Team operator.
👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
Binary-Offensive.com Poland