Binary Ninja Plugin 18 Sep 2024 Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware... Read more
Introducing SharpConflux 27 Mar 2024 Today, we are releasing a new tool called SharpConflux, a .NET application built to facilitate Confluence exploration. It... Read more
Yasha - Yet Another Security Header Analyser 6 Mar 2024 Security headers. Everyone’s encountered them. Security testers find them on every web application test, and it can be... Read more
Introducing Aladdin 1 Mar 2024 Introducing Aladdin, a new tool and technique for red teamers to bypass misconfigured Windows Defender Application Control (WDAC)... Read more
Avoiding Detection with Shellcode Mutator 21 Dec 2022 Today we are releasing a new tool to help red teamers avoid detection. Shellcode is a small piece... Read more
Logparser Query Files 7 Aug 2022 We have created a set of queries for sysmon log files that will process each of the Event... Read more
Introducing MalSCCM 4 May 2022 During red team operations the goal is often to compromise a system of high value. These systems will... Read more
PoshC2 documentation 31 Mar 2022 We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/. For your convenience, we have also embedded it below. Read more
Introducing PoshC2 v8.0 30 Mar 2022 We’re thrilled to announce a new release of PoshC2 packed full of new features, modules, major improvements, and... Read more
Introducing RunOF - Arbitrary BOF tool 2 Mar 2022 A few years ago, a new feature was added to Cobalt Strike called “Beacon Object Files” (BOFs). These... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*