- Offensive Security intern at IBM X-Force Red
- I like exploiting Active Directory/internal networks
- OSCP, CRTO certified
- I write fun stuff on my blog: https://logan-goins.com
-
IBM X-Force Red
- Texas
- logan-goins.com
- in/logan-goins
- @_logangoins
Pinned Loading
-
LogansBestFriend
LogansBestFriend PublicCustomized Shellcode loader which bypasses AV/EDR sandbox detections and decrypts shellcode in memory.
C++ 5
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.