events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

No Events Found

Up Next

In The Past

Past

How Graphs Changed The Way Hackers Attack

Oct 25, 2017
Past

Not a Security Boundary: Bypassing User Account Control

Sep 24, 2017
Past

Here Be Dragons: The Unexplored Land of Active Directory ACLs

Sep 22, 2017
Past

An ACE in the Hole: Stealthy Host Persistence via Security Descriptors

Sep 22, 2017
Past

Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research

Sep 22, 2017
Past

An ACE Up The Sleeve: Designing Active Directory DACL Backdoors

Jul 28, 2017
Past

An ACE Up The Sleeve – Designing Active Directory DACL Backdoors

Jul 26, 2017
Past

Doomsday Preppers: Fortifying Your Red Team Infrastructure

May 20, 2017
Past

Catch Me If You Can: PowerShell Red vs. Blue

May 18, 2017
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert