# Shoutouts The following are people mentioned in the text in one way or another, while not necessary including a dedicated reference. [Taylor Leach](https://twitter.com/taylorleach) - Cover art + editing
[Jeff Foley](https://twitter.com/jeff_foley) - editing
[Lucas Morris](https://twitter.com/lucasjmorris) - editing
[Chris McCann](https://twitter.com/cmcsec) - editing
[Javier Marcos](https://twitter.com/javutin) - editing
[John Kennedy](https://twitter.com/0xpookie) - editing
[Louis Barrett](https://github.com/louisbarrett) - editing
[Joe Demesy](https://twitter.com/littlejoetables) - editing & Sliver developer
[Alex Levinson](https://twitter.com/alexlevinson) - editing & pages 59, 209
[National CCDC](https://twitter.com/NationalCCDC/) - pages 13, 184
[Pros v Joes](http://prosversusjoes.net/) - pages 13, 54, 184
[Linda Pesante](https://resources.sei.cmu.edu/library/author.cfm?authorid=4121) - page 3
[Raphael Mudge](https://twitter.com/armitagehacker) - pages 10, 13, 193
[Robert Clark](https://www.amazon.com/Books-Robert-M-Clark) - page 16
[Barton Whaley](https://www.amazon.com/Barton-Whaley/e/B001HOOZBS) - page 16
[Kevin Mitnick](https://twitter.com/kevinmitnick) - page 17
[Matthew Monette](https://twitter.com/networkattack) - pages 19, 39
[Chris Nickerson](https://twitter.com/indi303) - page 20
[Dimitry Alperovitch](https://twitter.com/dalperovitch?) - page 27
[Opensecuritytraining](https://twitter.com/opensectraining) - pages 36, 181
[Dave Cowen](https://twitter.com/hecfblog) - pages 39, 191
[Paralax](https://twitter.com/jnazario) - page 46
[SecurityOnion2](https://twitter.com/securityonion) - page 54
[John Lambert](https://twitter.com/johnlatwc) - page 55
[Jeff McJunkin](https://twitter.com/jeffmcjunkin) - page 58
[C2 Matrix](https://twitter.com/c2_matrix) - page 60
[Vyrus001](https://twitter.com/vyrus001) - page 76
[Russel Van Tuyrl](https://twitter.com/ne0nd0g) - page 77
[Matt Graber](https://twitter.com/mattifestation) - page 78
[3ndG4me](https://twitter.com/3ndG4me_) - page 79
[Jared Atkinson](https://twitter.com/jaredcatkinson) - page 86
[Adam Chester](https://twitter.com/_xpn_) - page 87
[Forrest Orr](https://twitter.com/_forrestorr) - page 87
[Hasherezade](https://twitter.com/hasherezade) - page 88
[SwiftOnSecurity](https://twitter.com/SwiftOnSecurity) - page 90
[Olaf Hardtong](https://twitter.com/olafhartong) - page 90
[Eric Zimmerman](https://twitter.com/EricRZimmerman) - page 98
[Oddvar Moe](https://twitter.com/Oddvarmoe) - page 100
[SymbolCrash](https://twitter.com/symbolcrash1) - page 102
[TrustedSec blog](https://twitter.com/TrustedSec) - page 112
[0DaySimpson](https://twitter.com/0DaySimpson) - page 114
[Mark Baggett](https://twitter.com/markbaggett) - page 115
[Hexacorn](https://twitter.com/hexacorn) - pages 76, 116
[3gStudent](https://twitter.com/3gStudent) - page 127
[QAX-A-Team](https://github.com/QAX-A-Team) - page 127
[Benjamin Lim](https://twitter.com/limbenjamincom) - page 128
[Justin Bui](https://twitter.com/slyd0g) - page 128
[Vlad Rico](https://twitter.com/ricovlad) - page 130
[Xavier Martens](https://twitter.com/xme) - page 134
[Sandfly Security](https://twitter.com/SandflySecurity) - page 135
[Mathias Jessen](https://twitter.com/iisresetme) - page 141
[David Fifield](https://www.bamsoftware.com/talks/) - page 142
[Chris Fosterelli](https://twitter.com/chrisfosterelli) - page 152
[Neon Tokyo](https://twitter.com/tokyoneon_) - page 157
[Eurialo](https://twitter.com/ociredefz) - page 158
[X-c3ll](https://twitter.com/TheXC3LL) - page 158
[Zephrax](https://github.com/zephrax) - page 159
[Alexander Korznikov](https://twitter.com/nopernik) - page 162
[Piotr DuszyƄski](https://twitter.com/Drk1wi) - page 174
[US Cyber Challenge](https://twitter.com/uscybchallenge) - page 180
[RPIsec](https://twitter.com/RPIsec) - page 181
[Daniel Miessler](https://twitter.com/danielmiessler) - page 184
[Awgh](https://github.com/awgh) - page 186
[Alex Birson](https://twitter.com/alxbrsn) - page 186
[Lares](https://twitter.com/lares_) - page 187
[Samy Kamkar](https://twitter.com/samykamkar) - page 187
[Adam Shostack](https://twitter.com/adamshostack) - page 189
[Steve Miller](https://twitter.com/stvemillertime) - page 189
[inversecos](https://twitter.com/inversecos) - page 190
[Andrew Oliveau](https://twitter.com/AndrewOliveau) - page 190
[Ron Bowes](https://twitter.com/iagox86) - page 199
[TryCatchHCF](https://twitter.com/trycatchhcf) - page 200
There are likely more mentions that I missed when going through and putting this list together. If you think this list is missing a mention please open an issue :)
There are also about 350 [references](https://github.com/ahhh/Cybersecurity-Tradecraft/blob/main/References/references.md) throughout this book, so it's likly a tool or blog post you've worked on is in there instead of the shoutouts