MDSec

@MDSecLabs

Consultancy and Training from a trusted supplier. Red Team and Adversary Simulation by ActiveBreach team.

Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @MDSecLabs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MDSecLabs

  1. Prikvačeni tweet
    31. sij

    and will be bringing our popular Adversary Simulation and Red Team Tactics training to the US this year at

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    "This course is not just about learning how to run tools, students will learn how the tools work under the hood as well as how to develop and customise their own; an essential skill for any red teamer." <--- this right here. 👌 Looking for a red team training? Look no further.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Had an amazing day in office yesterday, web sec training by one of its masters Marcus Pinto, being beaten in ctf and burp ext writing by (I let him win you know😉), following by research talks and dinner and night out with colleagues, then coding till 2am 🙃

    Poništi
  4. 30. sij

    And now with have with some knowledge on popping Firefox

    Poništi
  5. 30. sij

    And next up to the have Taha talking about Kubernetes for pentesters! 👍

    Poništi
  6. 30. sij

    The first speaker on tonight’s team research night is detailing how to bypass Cylance using syscalls for API unhooking

    Poništi
  7. proslijedio/la je Tweet

    The Appsec track is strong too, with people who've literally written the book and the likes

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Attended this last year, can't recommend it enough. and were super friendly and answered all the daft questions I had. Content was upto date and full of stuff I hadn't seen before. 100% worth it. Still feel sorry for that poor projector though...

    Poništi
  9. 27. sij

    The details for our next Adversary Simulation and Red Team Tactics training with and are now live, featuring new material!

    Poništi
  10. 25. sij

    Congratulations to ph0well for winning our CTF, we’ll be in touch shortly with details on how to claim your prize!

    Poništi
  11. proslijedio/la je Tweet
    24. sij
    Odgovor korisnicima
    Poništi
  12. proslijedio/la je Tweet
    24. sij

    Access the CTF for here to get a chance to win a place on Web Application Hackers Handbook Course!

    Poništi
  13. proslijedio/la je Tweet
    24. sij
    Poništi
  14. 24. sij

    Don’t miss ’s talk on the Office365 Attack Toolkit at today

    Poništi
  15. 21. sij
    Poništi
  16. proslijedio/la je Tweet
    21. sij

    I'm running the Career Hacking Village CTF on where the winner will have the opportunity to attend our Web Application Hackers Handbook training. You MUST BE a student to participate. Register on:

    Poništi
  17. proslijedio/la je Tweet
    21. sij

    are very excited to announce that we'll be sponsoring the prize for the Career Hacking Village CTF this Friday - A place on our Web Application Hackers Handbook Course! Thanks to for setting this up, come and see & I in the village!

    Poništi
  18. proslijedio/la je Tweet
    14. sij

    This blog post is amazing and wild. Gets into the source code bits of the scripts that make NetScaler work

    Prikaži ovu nit
    Poništi
  19. 14. sij

    We’ve now updated our blog post with an additional, yet undisclosed technique for exploitation

    Poništi
  20. 10. sij
    Poništi
  21. proslijedio/la je Tweet
    7. sij

    📢 Marcus Pinto, Director at will deliver 3-days training on "Beyond the Web Application Hacker's Handbook - Advanced " at . ℹ️ Register today & avail pre-con discount to save Rs. 6,000➡️

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·