WinDbg: using pykd to dump private symbols 11 Apr 2018 We’ve recently been conducting some reverse engineering and vulnerability analysis on an Anti Virus (AV) product and wanted... Read more
Using Frida to Bypass Snapchat’s Certificate Pinning 13 Mar 2018 We have recently published an article discussing the basics of certificate pinning – TLS Certificate Pinning 101. We... Read more
TLS Certificate Pinning 101 13 Mar 2018 Certificate pinning is the process of associating a host with their expected X.509 certificate or public key. Once... Read more
Making PoshC2 More Accessible With a $5 VPS 31 Jan 2018 Users may find it difficult to host a PoshC2 server as it requires a Windows host, either directly... Read more
How to fix Burp Suite SSL/TLS connection problems 20 Aug 2017 Burp Suite is one of the tools our consultants frequently use when diving into a web application penetration... Read more
Fun with Windows binaries - application whitelist bypass using... 15 Dec 2016 We were inspired by the work @subTee has done with application whitelisting. Consequently, we decided to have a hunt around for legitimate... Read more
Malware Manual Unpacking - [Custom + UPX] 5 Oct 2015 Implementing all sort of methods to bypass anti-virus (AV) scanners and/or to make the analysis of a malware... Read more
Windows Inline Function Hooking 18 Mar 2015 Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*