events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Past

A Case Study in Attacking KeePass

Past

Windows Operating System Archaeology

Past

Windows Operating System Archaeology

Past

Porting Binary PowerShell Modules to Linux/OSX

Past

Catch Me If You Can: PowerShell Red vs. Blue

Past

Flip The Script

Past

Defending Your Gold

Past

BloodHound 1.3 – The ACL Attack Paths Update

Past

Catch Me If You Can: PowerShell Red vs. Blue

Past

Doomsday Preppers: Fortifying Your Red Team Infrastructure

Past

An ACE Up The Sleeve – Designing Active Directory DACL Backdoors

Past

An ACE Up The Sleeve: Designing Active Directory DACL Backdoors

Up Next

In The Past

Not A Security Boundary: Breaking Forest Trusts

Sep 06, 2019

Finding Our Path: How We’re Trying to Improve Active Directory Security

Aug 08, 2019

Bash-ing Brittle Indicators: Red Teaming macOS without Bash or Python

Jun 01, 2019

Not A Security Boundary: Breaking Forest Trusts

Mar 21, 2019

Ready Player 2: Multiplayer Red Teaming Against macOS

Feb 24, 2019

The Unintended Risks of Trusting Active Directory

Oct 05, 2018

When Macs Come Under ATTCK

Oct 05, 2018

A Process is No One: Hunting for Token Manipulation

Oct 05, 2018

ATT&Cking the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK

Sep 06, 2018
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert