Remote Code Execution in Broadcom Altiris IRM 7 Jul 2025 A critical unauthenticated remote code execution (RCE) vulnerability was discovered in the Broadcom Symantec Altiris Inventory Rule Management... Read more
Exploring the Shadow Labyrinth 26 Jun 2025 How LRQA cracked the Shadow Labyrinth in Hack The Box’s 2025 CTF, using reverse engineering, decryption and custom... Read more
Introducing Raccoon 6 Feb 2025 Introducing Raccoon - a C# tool for extending the screenshot functionality of Command and Control (C2) frameworks, even... Read more
Binary Ninja Plugin 18 Sep 2024 Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware... Read more
Introducing SharpConflux 27 Mar 2024 Today, we are releasing a new tool called SharpConflux, a .NET application built to facilitate Confluence exploration. It... Read more
Yasha - Yet Another Security Header Analyser 6 Mar 2024 Security headers. Everyone’s encountered them. Security testers find them on every web application test, and it can be... Read more
Introducing Aladdin 1 Mar 2024 Introducing Aladdin, a new tool and technique for red teamers to bypass misconfigured Windows Defender Application Control (WDAC)... Read more
Avoiding Detection with Shellcode Mutator 21 Dec 2022 Today we are releasing a new tool to help red teamers avoid detection. Shellcode is a small piece... Read more
Logparser Query Files 7 Aug 2022 We have created a set of queries for sysmon log files that will process each of the Event... Read more
Introducing MalSCCM 4 May 2022 During red team operations the goal is often to compromise a system of high value. These systems will... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*