ASkyeye
RedTeam fork robot.
⚠️ Please check the source code carefully before using the tool. :)
Austin Hudson
realoriginal
Professional Inquiries: austinhudson@protonmail.ch.
Cobalt Strike Research & Development Team
NULL
NUL0x4C
Windows MalDev Enthusiasts | Seeking Knowledge | co-founder of maldevacademy.com
dev2null
dev-2null
Penetration Tester | OSCP | OSCE | OSEP | AD Security Enthusiast | Allowed To Act On Behalf Of Other Identity
Forest
snovvcrash
snovvcrash
OSCP|OSEP|CRTO|CRTE :: Sr. Penetration Tester / Red Team Operator :: Author of Pentester’s Promiscuous Notebook (PPN)
(x(x_(x_x(O_o)x_x)_x)x)
Lars Karlslund
lkarlslund
Curious Security Minded Octopus, freelance security consultant, loves Active Directory, finding holes in the cheese, coding Golang, ntlm.pw
NetSection Security Denmark
Marcos Bajo
h3xduck
PhD student at CISPA and cybersecurity researcher. Passionate about low-level programming, malware and security in general.
Dortmund, Germany
Bobby Cooke
boku7
Adversary Simulation @ IBM X-Force Red
IBM X-Force Red Adversary Simulation United States
Mariusz Banach
mgeeky
🔴 Red Team operator.
👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
Binary-Offensive.com Poland
Mr.Un1k0d3r
Mr-Un1k0d3r
Mostly Red Team tools for penetration testing. My patreon https://patreon.com/MrUn1k0d3r
RingZer0 Team
PreviousNext