events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Past

Ready Player 2: Multiplayer Red Teaming Against macOS

Past

Not A Security Boundary: Breaking Forest Trusts

Past

Bash-ing Brittle Indicators: Red Teaming macOS without Bash or Python

Past

Finding Our Path: How We’re Trying to Improve Active Directory Security

Past

How do I detect technique X in Windows? Applied Methodology to Definitively Answer this Question

Past

Not A Security Boundary: Breaking Forest Trusts

Past

Practical Heuristic Exploitation

Past

Kerberoasting Revisited

Past

Waking up the data engineer in you!

Past

Understanding Windows Access Token Manipulation

Past

Walking the Bifrost: An Operator’s Guide to Heimdal & Kerberos on macOS

Past

How Not to Shoot yourself in the Foot with Patterns

Up Next

In The Past

An ACE in the Hole: Stealthy Host Persistence via Security Descriptors

Sep 22, 2017

Here Be Dragons: The Unexplored Land of Active Directory ACLs

Sep 22, 2017

An ACE Up The Sleeve: Designing Active Directory DACL Backdoors

Jul 28, 2017

An ACE Up The Sleeve – Designing Active Directory DACL Backdoors

Jul 26, 2017

Doomsday Preppers: Fortifying Your Red Team Infrastructure

May 20, 2017

Catch Me If You Can: PowerShell Red vs. Blue

May 18, 2017

BloodHound 1.3 – The ACL Attack Paths Update

May 11, 2017

Flip The Script

May 04, 2017

Defending Your Gold

May 04, 2017
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert