🧠
Teaching my AI to do my job...
🛠️Offensive security developer crafting tools for pentesters.🕵️♂️Living in Wireshark since 2016.🔄I break protocols, fix them, then break them again for fun!
- Somewhere between packets
- ntalexio2.github.io
- @NtAlexio2
Michael Paulino
mi6paulino
Founder VIGIA.I ©️ tracking integrated data
Michael Paulino Solutions New York City
BitMorphX
BitMorphX
"I morph bits, not to break, but to understand." — BitMorphX ©
Satoshi's Left Hand EARTH 🌐 255.255.255.255 ̵͎̪̉̓̀̄̔͛̊̇̀ ̶̥͇̯͇̃̍͊͐͛Q̷̱͂̈́̈͆̚͜U̷̢̧͕͈̖̫̠̤̜̼̦͈̻̲̩͔̓͆͒ͅA̸̹͂͑̈́̆̿̈́̈́̏͆̈́̊̾͂̈́̈́̒͑͘N̴̛̘̩̺͎̲̥̏͆̈͛̂̂̎̂̀̚̕͝͝ͅT̷̡̲̦̲͔͎͔̞̞̹̞̯̰̉͊̈́͒͑́͂Ũ̴̱̉̐̿M̸̨̢̟̲͍͔̮̝̀̅̃̌͆̅̾͑͆̈̾
BackdoorAli aka NotAlita
BackdoorAli
Red Teams by trade | CTFs | Exploits | Adversarial AI | Payloads | Pentesting | OSCP+ | Net+ | Sec+ | A+ | AZ900 | Cybersecurity Analyst | Data Analyst
📍 At the edge of privilege escalation - In the gap between "allowed" and "possible".
Rémi GASCOU (Podalirius)
p0dalirius
Senior Security Researcher @SpecterOps, Speaker, Microsoft MVP
@SpecterOps France
Sam Stepanyan
securestep9
OWASP Global Board Member /
OWASP London Chapter Leader (@owasplondon) with @kerberosmansour & @alezza
OWASP London Chapter London, UK
André Oliveira
andrecrafts
DevSecOps & Security Engineer. Crafting secure and scalable software.
AKA WafflesExploits.