events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Training Offering
Past

Adversary Tactics: Red Team Operations

Training Offering
Past

Adversary Tactics: Tradecraft Analysis

Training Offering
Past

Adversary Tactics: Red Team Operation

Training Offering
Past

Adversary Tactics: Detection

Training Offering
Past

Adversary Tactics: Vulnerability Research for Operators

Training Offering
Past

Adversary Tactics: Mac Tradecraft

Training Offering
Past

Adversary Tactics: Vulnerability Research For Operators

Training Offering
Past

Adversary Tactics: Mac Tradecraft

Training Offering
Past

Adversary Tactics: 
Red Team Operations Past

Training Offering
Past

Adversary Tactics: 
Tradecraft Analysis Past

Training Offering
Past

Adversary Tactics: 
Detection Past

Training Offering
Past

Adversary Tactics: 
Mac Tradecraft Past

Up Next

Training Offering
Upcoming
in-person

Black Hat USA 2023 – Adversary Tactics: Detection

August 5 - 8, 2023
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Adversary Tactics: Vulnerability Research for Operators

August 7 - 8, 2023
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Active Directory Security Fundamentals

August 7 - 8, 2023
Register
Training Offering
Upcoming
virtual

Adversary Tactics: Red Team Operations

August 22 - 25, 2023; US time zone
Register
Training Offering
Upcoming
virtual

Adversary Tactics: Detection

August 22 - 25, 2023; US time zone
Register
Training Offering
Upcoming
virtual

Adversary Tactics: Tradecraft Analysis

August 22 - 25, 2023; US time zone
Register

In The Past

Sponsored Event

Azure Privilege Escalation via Azure API Permissions Abuse Past

Dec 1, 2021 | 11:30am PT

Free IPA – Attacking The Active Directory Of Linux

Oct 17, 2020

How Not to Shoot yourself in the Foot with Patterns

Jun 30, 2020

Walking the Bifrost: An Operator’s Guide to Heimdal & Kerberos on macOS

Mar 12, 2020

Understanding Windows Access Token Manipulation

Dec 07, 2019

Waking up the data engineer in you!

Sep 08, 2019

Kerberoasting Revisited

Sep 07, 2019

Practical Heuristic Exploitation

Sep 07, 2019

How do I detect technique X in Windows? Applied Methodology to Definitively Answer this Question

Sep 06, 2019
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert