Authors

Josh (@BinaryFaultline)

Josh works as a Red Teamer for a major financial institution and has four years experience as a pentesting consultant. He is one level above a script kiddy but one day hopes to be useful to the security community and publish useful tools and code. Check back at https://github.com/jahawkins, maybe he has done something with his life.

Shawn (@AnthemToTheEgo)

Shawn works as a Red Team Operator and has over a decade of IT security experience.  He is a work in progress and is thankful to be surrounded by good friends who are as passionate as he is about security.  Published tools and code can be found here https://github.com/anthemtotheego

Dave (@G0ldenGunSec)

Dave also does offensive stuff.  He is a senior consultant with 8 years of IT experience, with time as both a sysadmin and a security consultant.  Published tools and code can be found here https://github.com/G0ldenGunSec

All opinions and content expressed in this blog are that of the authors and not their respective employers, friends, family, co-workers, significant others, pets, or any other entity. All information the author's provide is for research and educational purposes only and should not be used for any malicious or illegal purpose. Authors are not responsible for abuse of any code, tool, technique, or idea found in this blog.

Popular posts from this blog

No Shells Required - a Walkthrough on Using Impacket and Kerberos to Delegate Your Way to DA

Executing Macros From a DOCX With Remote Template Injection

Red Teaming Made Easy with Exchange Privilege Escalation and PowerPriv