SANSOffensive Profile Banner
SANS Offensive Operations Profile
SANS Offensive Operations

@SANSOffensive

Followers
71K
Following
12K
Media
8K
Statuses
19K

More Offensive Than Ever #PenTest | #PurpleTeam | #RedTeam | #ExploitDev Training, Certification, and Research

The Internet
Joined October 2010
Don't wanna be here? Send us removal request.
@SANSOffensive
SANS Offensive Operations
5 days
πŸ“£ Join us for the first-ever SANS Hack & Defend Summit this October in Austin, TX, for:. πŸ’» Hands-on workshops.🎀 Highly technical talks.πŸ‘₯ Unmatched networking. With two simultaneous tracks β€” Offense & Defense β€” you can choose your mission!. ➑️ Register:
Tweet media one
0
0
5
@SANSOffensive
SANS Offensive Operations
9 days
Happening now at #SupplyChainForum: Paul Asadoorian is exposing the growing risk of firmware attacks β€” and how they’re expanding the enterprise attack surface across sectors. It's not too late to Register Free & Join Us:
Tweet media one
0
0
2
@SANSOffensive
SANS Offensive Operations
10 days
πŸ“£ Starting in 10 Min! | Join us for the Supply Chain Cybersecurity Forum to explore how attackers exploit the digital supply chain & how you can test, break, & better secure it. πŸ—“οΈ Today, 9am-12pm ET.🌐 Free online forum.πŸ”– Earn 3 CPEs. ➑️ Register Free:
Tweet media one
0
0
0
@SANSOffensive
SANS Offensive Operations
10 days
πŸ“£ TOMORROW! | Join us for the Supply Chain Cybersecurity Forum to explore how attackers exploit the digital supply chain β€” & how you can test, break, & better secure it. πŸ—“οΈ Thursday, June 26 | 9am - 12pm ET.🌐 Free Virtual Forum. ➑️ Register for Free:
Tweet media one
0
0
1
@SANSOffensive
SANS Offensive Operations
11 days
πŸ“’ Now OnDemand!. Learn the calling conventions every red teamer and reverse engineer needs. Join @jon__reiter as he walks through stdcall, fastcall & more in WinDbg Part 3. πŸ“Ί Watch now: πŸ”— #WinDbg #RedTeam #ReverseEngineering #SEC670
Tweet media one
0
2
5
@SANSOffensive
SANS Offensive Operations
12 days
🚨 LIVE in 1 hour!. Join @jon__reiter for Part 3 of the WinDbg series. Learn how calling conventions impact your reverse engineering, from stdcall to fastcall. πŸ”— #WinDbg #RedTeam #ReverseEngineering #SEC670
Tweet media one
0
1
11
@SANSOffensive
SANS Offensive Operations
13 days
πŸ“ž Are you ready to trace function behavior in WinDbg?. Tomorrow, join @jon__reiter for Part 3 of the Intro to WinDbg series. This time, it’s all about calling conventions and reverse engineering. πŸ“… June 23 | 3:30 PM EDT.πŸ”— #WinDbg #RedTeam
Tweet media one
0
2
4
@SANSOffensive
SANS Offensive Operations
16 days
Join @Steph3nSims & @SecHubb in Austin, TX this October at SANS Hack & Defend Summit for hands-on workshops, in-depth talks, & networking w/ industry legends. With two simultaneous tracks β€” Defense & Offense β€” you choose your mission. ➑️ Save Your Spot:
Tweet media one
0
1
7
@SANSOffensive
SANS Offensive Operations
18 days
Join us at #SupplyChainForum when Paul Asadoorian exposes the growing risk of firmware attacksβ€”and how they expand the enterprise attack surface across sectors. Register for Free: #FirmwareSecurity #CyberSecurity
Tweet media one
1
1
2
@SANSOffensive
SANS Offensive Operations
18 days
πŸ› οΈ Want to reverse-engineer with precision?. Join @jon__reiter on June 23 for WinDbg Part 3 and learn how calling conventions like stdcall and fastcall shape real-world analysis. πŸ”— #RedTeam #WinDbg #SEC670 #ReverseEngineering
Tweet media one
0
2
8
@SANSOffensive
SANS Offensive Operations
24 days
πŸ“£ Join us at the SANS Hack & Defend Summit on Oct 28-29 in Austin, TX, for:. πŸ’» Hands-on workshops.🎀 Highly technical talks .πŸ‘₯ One-of-a-kind networking. With two simultaneous tracks β€” Defense & Offense β€” you can choose your mission!. ➑️ Learn More:
Tweet media one
0
1
2
@SANSOffensive
SANS Offensive Operations
25 days
πŸ” Your code is only as secure as the components you don’t control. Join us on Thursday, June 26 for the SANS Supply Chain Cybersecurity Forum to learn how to defend against hidden threats in software & hardware. ➑️ Register for Free:
Tweet media one
0
0
0
@SANSOffensive
SANS Offensive Operations
25 days
πŸ” Analyzing malware? If you don’t understand calling conventions, you might miss what’s passed where and why it matters. Join @jon__reiter on June 23 to dive into stdcall, fastcall, and more. πŸ”— #MalwareAnalysis #WinDbg #RedTeam #SEC670
Tweet media one
0
0
3
@SANSOffensive
SANS Offensive Operations
27 days
πŸ“£ LAST CALL! | The Hack & Defend Summit Call for Presentations CLOSES TODAY at 5pm ET!. Topics of interest include, but are not limited to:.πŸ”˜ Red Team case studies.πŸ”˜ Exploit Dev & tooling.πŸ”˜ Cloud/Offensive AI. ➑️ Learn More & Submit Your Proposal:
Tweet media one
0
0
5
@SANSOffensive
SANS Offensive Operations
29 days
Join us at #SupplyChainForum when Kasimir Schulz breaks down the hidden risks of open source AI models β€” licensing conflicts, unsafe code, and backdoors β€” and how AIBOMs can help. Register for Free: #AIsecurity
Tweet media one
0
0
3
@SANSOffensive
SANS Offensive Operations
30 days
πŸ“£ The Hack & Defend Summit CFP closes Monday!. We're looking for talks on:.πŸ”˜ Red Team case studies.πŸ”˜ Exploit Dev & tooling.πŸ”˜ Cloud/Offensive AI. and more!. Don't miss this chance to share your knowledge with the community!. ➑️ Learn More & Submit:
Tweet media one
0
1
0
@SANSOffensive
SANS Offensive Operations
1 month
Crack the Code of Web App Security!. The best pentesters don’t rely on luckβ€”they follow a structured methodology. This poster arms you with proven content discovery and fuzzing techniques to break through web app defenses. Get your free copy today!
Tweet media one
0
2
10
@SANSOffensive
SANS Offensive Operations
1 month
RT @SANSInstitute: Jump headfirst into this year's SANS #EmergingSummit talks! The newly released playlist is now ready to binge! Watch Her….
0
7
0
@SANSOffensive
SANS Offensive Operations
1 month
πŸ“£ Join us for the SANS Supply Chain Cybersecurity Forum, where leading practitioners take on one of today’s biggest cybersecurity challenges: securing the digital supply chain from code to component. πŸ—“οΈ Thursday, June 26 | 9AM-12PM ET. ➑️ Register Free:
Tweet media one
0
0
2
@SANSOffensive
SANS Offensive Operations
1 month
πŸ“ž If you can’t track the 3rd argument in a function, you might miss the most critical part of your malware analysis. Join @jon__reiter on June 23 to explore calling conventions in WinDbg Part 3: Call Me Maybe. πŸ”— #WinDbg #RedTeam #ReverseEngineering
Tweet media one
0
2
6