Recent Posts
A Case Study in Wagging the Dog: Computer Takeover
Last month, Elad Shamir released a phenomenal, in depth post...
Read MoreNot A Security Boundary: Breaking Forest Trusts
For years Microsoft has stated that the forest was the...
Read MoreOffensive Engineer & Red Teamer
I am a technical architect/offensive engineer at SpecterOps where I help execute red team engagements, security research, offensive tool development, and security training. I am a former Microsoft PowerShell/CDM MVP and retain the OSCP and OSCE certifications. I’ve presented at a number of conferences including Black Hat, DEF CON, SO-CON, DerbyCon, ShmooCon, PSConfEU, Troopers, BlueHat Israel, CarolinaCon, and several Security BSides conferences on topics spanning AV-evasion, Active Directory, post-exploitation, red team tradecraft, BloodHound, malicious access control, malware, and offensive PowerShell. I am also the course architect for “Adversary Tactics: Red Team Operations” and formerly co-developed/taught the “Adaptive Red Team Tactics”, “Advanced PowerShell for Offensive Operations”, and “Adversary Tactics: PowerShell” training courses.
Co-Founder & Developer
GhostPack
A collection of security related tools
Bloodhound
A graph-based attack path analysis tool.
Slack invite
Empire/EmPyre
A PowerShell/Python post-exploitation agent
PowerView & PowerUp
Part of the PowerSploit post-exploitation framework
Veil-Framework
An AV-evasion framework
PowerSploit
PowerShell post-exploitation framework
Top Posts
Not A Security Boundary: Breaking Forest Trusts
For years Microsoft has stated that the forest was the...
Read MoreOperational Guidance for Offensive User DPAPI Abuse
I’ve spoken about DPAPI (the Data Protection Application Programming Interface)...
Read More