Bobby Cooke

Adversary Simulation Services, IBM X-Force Red

Greater Phoenix Area United States
email-iconphone-icongithub-logolinkedin-logotwitter-logostackoverflow-logofacebook-logo
Join Prog.AI to see contacts
email-iconphone-icongithub-logolinkedin-logotwitter-logostackoverflow-logofacebook-logo
Join Prog.AI to see contacts

Summary

🤩
Rockstar
Bobby Cooke is a Red Team Operator on IBM X-Force Red with nine years of experience specializing in malware R&D, command-and-control, and offensive security tool development. A prolific exploit author with 80+ published exploits and shellcodes (40+ on Exploit-DB) and 20+ CVEs, he leads open-source projects like BokuLoader—a reflective Cobalt Strike–style loader that integrates AMSI and ETW bypasses and advanced evasion techniques. His tooling and research have been adopted across the offensive security ecosystem, including the Cobalt Strike Community Kit, Sliver Armory, Hack The Box and DEFCON Red Team Village CTF. Based in the Greater Phoenix Area, he focuses on discovering unique exploit chains and evolving red-team tradecraft to help organizations stay ahead of emerging threats.
code9 years of coding experience
job3 years of employment as a software developer
github-logo-circle

Github Skills (8)

offensive-security10
red10
cobalt10
assembly10
reverse-engineering10
c-programming10
assemble10
assembler10

Programming languages (8)

PowerShellCGoPHPXSLTHTMLAssemblyPython

Github contributions (5)

github-logo-circle
boku7/BokuLoader

Aug 2021 - Jul 2022

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Role in this project:
userSecurity Engineer
Contributions:4 reviews, 218 commits, 26 PRs in 11 months
Contributions summary:Bobby primarily contributed to a proof-of-concept reflective loader, focusing on integrating and enhancing evasion features. The commits demonstrate the user's deep understanding of system-level programming and security by implementing a reflective loader and incorporating techniques to bypass security measures. The user made significant changes to the core reflective loader code, including obfuscation and system call techniques, and implemented AMSI and ETW bypasses. These contributions show a strong focus on red teaming and offensive security.
definedreflectivestrikecobalt-strikecapabilities
boku7/homeRent-SQLi-RCE

Aug 2020 - Aug 2020

Contributions:21 commits, 6 pushes, 1 branch in 14 days
Find and Hire Top DevelopersWe’ve analyzed the programming source code of over 60 million software developers on GitHub and scored them by 50,000 skills. Sign-up on Prog,AI to search for software developers.
Request Free Trial
Bobby Cooke - Adversary Simulation Services, IBM X-Force Red