events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Past

Free IPA – Attacking The Active Directory Of Linux

Past

How Not to Shoot yourself in the Foot with Patterns

Past

Walking the Bifrost: An Operator’s Guide to Heimdal & Kerberos on macOS

Training Offering
Past

Adversary Tactics: 
Red Team Operations Past

Training Offering
Past

Adversary Tactics: 
Tradecraft Analysis Past

Training Offering
Past

Adversary Tactics: 
Detection Past

Past

Understanding Windows Access Token Manipulation

Past

Waking up the data engineer in you!

Past

Practical Heuristic Exploitation

Past

Kerberoasting Revisited

Past

How do I detect technique X in Windows? Applied Methodology to Definitively Answer this Question

Past

Not A Security Boundary: Breaking Forest Trusts

Past

Finding Our Path: How We’re Trying to Improve Active Directory Security

Past

Bash-ing Brittle Indicators: Red Teaming macOS without Bash or Python

Past

Not A Security Boundary: Breaking Forest Trusts

Up Next

In The Past

Past

A Process is No One: Hunting for Token Manipulation

Oct 05, 2018
Past

When Macs Come Under ATTCK

Oct 05, 2018
Past

ATT&Cking the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK

Sep 06, 2018
Past

Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

Aug 08, 2018
Past

ATT&CKing with Threat Intelligence

Jul 20, 2018
Past

Threat-based Purple Teaming with ATT&CK

May 07, 2018
Past

Working with Binary Data: Writing your own parser

Apr 19, 2018
Past

Auditing Domain Trust Relationships

Apr 19, 2018
Past

The Power of the Dark Side: Offensive PowerShell Workshop

Apr 18, 2018
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert