Who to follow on twitter

No BS tips and tricks from researchers concerning red teams, penetration tests, and adversary simulations.

Topics discussed are but not limited to: Endpoint protection bypasses, anti-malware bypass, AMSI bypass, download cradles, LOLBins, powershell & python C2, adversary tactics, etc.

Comments