Some_Pentesters_SecurityResearchers_RedTeamers
https://lnkd.in/eVfKuah] + these guys in below list are Influential Security Researchers/Pentesters/Red Teamers...
for me, "john" from Purple team [Note: in my opinion they have/had good researches and codes, this is not all of them in my list & you can make your own list better than me ;D ...
(list last update: 29 Mar 2021)
1. hasherezade (Education: Malware Training) => https://github.com/hasherezade/malware_training_vol1
2. 0xpat (Education: Red/Purple Teamers [Malware development] ) => https://0xpat.github.io/
3. @ShitSecure (Nim Codes for CBT CallBackTechniques) => https://github.com/S3cur3Th1sSh1t/Nim_CBT_Shellcode
4. @_EthicalChaos_ (Mirrordump, dump lsass) => https://github.com/CCob/MirrorDump
5. @_EthicalChaos_ , (MiniHook, hooking native API calls ) => https://github.com/CCob/MinHook.NET
6. Black Lantern Security, ( writehat , Pentest reporting tool written in Python) => https://github.com/blacklanternsecurity/writehat
7. jthuraisamy, (Enumerate and disable common sources of telemetry used by AV/EDR.) => https://github.com/jthuraisamy/TelemetrySourcerer
8. ChaitanyaHaritash , (Shellcode Execution via Callback Func) => https://github.com/ChaitanyaHaritash/Callback_Shellcode_Injection
9. S4R1N, (Shellcode Execution via Callback Func) => https://github.com/S4R1N/AlternativeShellcodeExec
10. Deep Instinct, (lsass Dumper) => https://github.com/deepinstinct/LsassSilentProcessExit
11. asaurusrex, (Project to check which Nt/Zw functions your local EDR is hooking) => https://github.com/asaurusrex/Probatorum-EDR-Userland-Hook-Checker
12. optive, ScareCrow (Bypass EDR hooks, Whitelisting) => https://github.com/optiv/ScareCrow
13. antonioCoco or @splinter_code (Mapping-Injection) => https://github.com/antonioCoco/Mapping-Injection
14. @spotheplanet (C++, minidumpwritedump , [without mimikatz]) => https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques/blob/master/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass.md
15. @m0rv4i (C#, SafetyDump PID/lsass dumper [in-memory]) https://github.com/m0rv4i/SafetyDump
16. https://twitter.com/marcosd4h Minjector/Memhunter (injector/ETW) => https://github.com/marcosd4h/memhunter
17. sh4hin , GoPurple (injector) => https://github.com/sh4hin/GoPurple
18. odzhan , Injection Methods => https://github.com/odzhan/injection
19. monozgas , sRDI (injector) => https://github.com/monoxgas/sRDI
20. https://twitter.com/thepentestwiki
21. https://twitter.com/r3n_hat , GRAT2 => https://github.com/r3nhat/GRAT2
22. https://twitter.com/jxy__s , Process herpaderping => https://github.com/jxy-s/herpaderping
23. ION28 , Blue teams monitor systems => https://github.com/ION28/BLUESPAWN
24. https://twitter.com/jtsmith282
25. https://twitter.com/martinoj2009
26. https://twitter.com/Ch0pin , AVIator => https://github.com/Ch0pin/AVIator
27. https://twitter.com/peewpw
28. https://twitter.com/netbiosX
29. https://twitter.com/vvalien1
30. https://twitter.com/TheRealWover , donut => https://github.com/TheWover/donut
31. https://twitter.com/jack_halon
32. https://twitter.com/mubix
33. https://twitter.com/bohops
34. https://twitter.com/_xpn_
35. https://twitter.com/am0nsec
36. https://twitter.com/buffaloverflow
37. https://twitter.com/domchell
38. https://twitter.com/5ub34x
39. https://twitter.com/424f424f
40. https://twitter.com/_RastaMouse
41. https://twitter.com/b4rtik , SharpMiniDump => https://github.com/b4rtik/SharpMiniDump
42. https://twitter.com/spotheplanet
43. https://twitter.com/FuzzySec => https://github.com/FuzzySecurity/SharpSploit
44. https://twitter.com/Dinosn
45. https://twitter.com/pedro31851511 => https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL
46. https://twitter.com/gweeperx , SSI (injector) => https://github.com/DimopoulosElias/SimpleShellcodeInjector
47. https://twitter.com/hasherezade
48. https://twitter.com/byt3bl33d3r , SILENTTRINITY => https://github.com/byt3bl33d3r/SILENTTRINITY
49. https://twitter.com/OsandaMalith
50. badBounty , directInjectorPOC => https://github.com/badBounty/directInjectorPOC
51. mvelazc0 , PurpleSharp => https://github.com/mvelazc0/PurpleSharp
52. http://twitter.com/slaeryan , Red-Teamer/Pentester Tools => https://github.com/slaeryan/AQUARMOURY
53. boh , C# Tools => https://github.com/boh/RedCsharp
54. shogunlab , (Education: ebook) => https://github.com/shogunlab/building-c2-implants-in-cpp
55. redcanaryco , Red-Teaming => https://github.com/redcanaryco/atomic-red-team
56. https://twitter.com/_batsec_ , shad0w => https://github.com/bats3c/shad0w
57. https://twitter.com/_forrestorr , DLL hollowing => https://github.com/forrest-orr/phantom-dll-hollower-poc