events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Past

Ready Player 2: Multiplayer Red Teaming Against macOS

Past

When Macs Come Under ATTCK

Past

A Process is No One: Hunting for Token Manipulation

Past

The Unintended Risks of Trusting Active Directory

Past

ATT&Cking the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK

Past

Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

Past

ATT&CKing with Threat Intelligence

Past

Threat-based Purple Teaming with ATT&CK

Past

Auditing Domain Trust Relationships

Past

Working with Binary Data: Writing your own parser

Past

PowerShell, Reflection, and the Windows API

Past

The Power of the Dark Side: Offensive PowerShell Workshop

Past

The Unintended Risks of Trusting Active Directory

Past

Subverting Trust in Windows

Past

Hi, My Name is “CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US”

Up Next

In The Past

Past

PowerShell, Reflection, and the Windows API

Apr 18, 2018
Past

The Unintended Risks of Trusting Active Directory

Apr 07, 2018
Past

Subverting Trust in Windows

Mar 15, 2018
Past

Hi, My Name is “CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US”

Jan 24, 2018
Past

A Process is No One: Hunting for Token Manipulation

Dec 07, 2017
Past

_____ Is Not a Security Boundary: Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software

Nov 07, 2017
Past

Subverting & Restoring Trust in Windows

Nov 07, 2017
Past

Windows Operating System Archaeology

Oct 27, 2017
Past

Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure

Oct 25, 2017
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert