# Special Thanks & Credits

### Special Thanks

* **Jackson Thuraisamy**: For agreeing to review a first draft of this primer, then providing thoughtful and helpful feedback.
  * [Twitter](https://twitter.com/Jackson_T)
  * [Website](http://jackson-t.ca/)
  * [GitHub](https://github.com/jthuraisamy)

### Inspirational Folks and Influences

* **Josh Lospinoso**: For introducing me to the world of modern C++ and implant development.
  * [Twitter](https://twitter.com/jalospinoso)
  * [Website](https://lospi.net/)
  * [GitHub](https://github.com/JLospinoso)
* **SpecterOps Trainers & RTO Course**: For providing a strong foundation from which to learn about Red Team tools, techniques and theory.
  * **Cody Thomas**
    * [Twitter](https://twitter.com/its_a_feature_)
    * [Website](https://its-a-feature.github.io/)
    * [GitHub](https://github.com/its-a-feature)
  * **Matt Hand**
    * [Twitter](https://twitter.com/matterpreter)
    * [Website](https://medium.com/@matterpreter)
    * [GitHub](https://github.com/matterpreter)
  * **Will Schroeder**
    * [Twitter](https://twitter.com/harmj0y)
    * [Website](https://www.harmj0y.net/blog/)
    * [GitHub](https://github.com/HarmJ0y)
  * **Carlo Alcantara**
    * [Twitter](https://twitter.com/carloalcan)
    * [Website](http://www.dcellular.net/blog/)
  * **Adversary Tactics: Red Team Operations**
    * [Website](https://specterops.io/how-we-help/training-offerings/adversary-tactics-red-team-operations)
* **Silent Break Security Trainers & DSO Malware Dev Course**: For giving me the confidence to pursue malware development in Red Team operations.
  * **Trevor Alexander**
    * [Twitter](https://twitter.com/culturedphish)
    * [GitHub](https://github.com/culturedphish)
  * **Nick Landers**
    * [Twitter](https://twitter.com/monoxgas)
    * [GitHub](https://github.com/monoxgas)
  * **Will Pearce**
    * [Twitter](https://twitter.com/moo_hax)
    * [GitHub](https://github.com/moohax)
  * **Dark Side Ops 1: Malware Dev**
    * [Website](https://silentbreaksecurity.com/training/malware-dev/)

### Graphics

All the graphics used in this book were obtained from [thenounproject.com](https://thenounproject.com/), under a [Creative Commons license](https://creativecommons.org/licenses/by/3.0/us/legalcode) and the authors are credited as follows:

* Chapter 1 Logo by [Serhii Smirnov](https://thenounproject.com/pockerironsv)
* Chapter 2 Logo by [Chanut is Industries](https://thenounproject.com/chanut-is)
* Chapter 3 Logo by [Wahyu Prihantoro](https://thenounproject.com/torro2128)
* Chapter 4 Logo by [alvianwijaya](https://thenounproject.com/alvianwijaya)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://shogunlab.gitbook.io/building-c2-implants-in-cpp-a-primer/credits-and-special-thanks.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
