
SANS Offensive Operations
@SANSOffensive
Followers
71K
Following
12K
Media
8K
Statuses
19K
More Offensive Than Ever #PenTest | #PurpleTeam | #RedTeam | #ExploitDev Training, Certification, and Research
The Internet
Joined October 2010
Happening now at #SupplyChainForum: Paul Asadoorian is exposing the growing risk of firmware attacks β and how theyβre expanding the enterprise attack surface across sectors. It's not too late to Register Free & Join Us:
0
0
2
π’ Now OnDemand!. Learn the calling conventions every red teamer and reverse engineer needs. Join @jon__reiter as he walks through stdcall, fastcall & more in WinDbg Part 3. πΊ Watch now: π #WinDbg #RedTeam #ReverseEngineering #SEC670
0
2
5
π¨ LIVE in 1 hour!. Join @jon__reiter for Part 3 of the WinDbg series. Learn how calling conventions impact your reverse engineering, from stdcall to fastcall. π #WinDbg #RedTeam #ReverseEngineering #SEC670
0
1
11
π Are you ready to trace function behavior in WinDbg?. Tomorrow, join @jon__reiter for Part 3 of the Intro to WinDbg series. This time, itβs all about calling conventions and reverse engineering. π
June 23 | 3:30 PM EDT.π #WinDbg #RedTeam
0
2
4
Join @Steph3nSims & @SecHubb in Austin, TX this October at SANS Hack & Defend Summit for hands-on workshops, in-depth talks, & networking w/ industry legends. With two simultaneous tracks β Defense & Offense β you choose your mission. β‘οΈ Save Your Spot:
0
1
7
Join us at #SupplyChainForum when Paul Asadoorian exposes the growing risk of firmware attacksβand how they expand the enterprise attack surface across sectors. Register for Free: #FirmwareSecurity #CyberSecurity
1
1
2
π οΈ Want to reverse-engineer with precision?. Join @jon__reiter on June 23 for WinDbg Part 3 and learn how calling conventions like stdcall and fastcall shape real-world analysis. π #RedTeam #WinDbg #SEC670 #ReverseEngineering
0
2
8
π Analyzing malware? If you donβt understand calling conventions, you might miss whatβs passed where and why it matters. Join @jon__reiter on June 23 to dive into stdcall, fastcall, and more. π #MalwareAnalysis #WinDbg #RedTeam #SEC670
0
0
3
Join us at #SupplyChainForum when Kasimir Schulz breaks down the hidden risks of open source AI models β licensing conflicts, unsafe code, and backdoors β and how AIBOMs can help. Register for Free: #AIsecurity
0
0
3
RT @SANSInstitute: Jump headfirst into this year's SANS #EmergingSummit talks! The newly released playlist is now ready to binge! Watch Herβ¦.
0
7
0
π If you canβt track the 3rd argument in a function, you might miss the most critical part of your malware analysis. Join @jon__reiter on June 23 to explore calling conventions in WinDbg Part 3: Call Me Maybe. π #WinDbg #RedTeam #ReverseEngineering
0
2
6