Posts about

Red Team (4)

SCYTHE’s Ethical Hacking Maturity Model

Overview SCYTHE’s Ethical Hacking Maturity Model enables leading organizations...

Read More

Cuddling the Cozy Bear, Emulating APT29 by Jorge Orchilles - Cyber Junegle

Adversary Emulation is a type of ethical hacking engagement where the...

Read More

Wild West Hackin' Cast by Bryson Bort & Jorge Orchilles - Adversarial Emulation with the C2 Matrix

Open source tool release and updates: this is information for the...

Read More

From Moonshot to Slingshot (C2 Matrix Edition)

Read More

Bryson Bort's presentation at Advanced Persistent Talks - Adversarial Emulation

‍ The presentation goes through multiple considerations of the entire...

Read More

Breaking Imphash

Signaturing is a technique used to associate a unique value to a malware....

Read More

Bryson Bort's Presentation at Wild West Hackin' Fest

‍ Bryson Bort gives a talk at Wild West Hackin' Fest 2019 about...

Read More

Bryson Bort’s presentation at DerbyCon 2019 - Adversarial Emulation

‍Learn to move your defenses and understanding beyond a...

Read More

Modern Authentication Bypasses

Introduction *hacker voice* “I’m in” is a Hollywood-esque phrase you’ve...

Read More