Petko Melin @petkomelin
I recently completed the course "Modern Red Team Malware Tactics" and was very impressed with the level of instruction and the practical knowledge I gained.
I highly recommend the course to anyone who wants to dive deep into practical Initial Access strategies and learn more about implementing some of the most modern tactics for Initial Breach during a Red Team exercise.
The instructor of the course was the very experienced and talented red teamer Mariusz Banach, who has a wealth of experience in the field and was able to provide valuable insights from his heavy research and real-world examples throughout the course.
Posted on LinkedIn
Adrian Dinca @adrian-dinca
Aight, I need a break after this one 😵
On the first day Mariusz mentioned that he will be delivering a lot of information. I called that a bluff. Oh boy was I wrong... The "Modern Red Team Malware Development Strategies" training is a beast.
The information is top notch, some undocumented attack paths/tricks, great private tools to aid the process and Mariusz does a great job presenting all this.
Participants beware: there WILL BE A TON of information which needs to be assimilated, but it is all worth the effort.
Definitely recommending this to anyone that needs to expand their knowledge regarding malware (both from a red as well as blue team perspective) Thank you Mariusz Banach
Posted on LinkedIn
Ivan Da Silva @humble_desser
Mariusz Banach is a red team operator and former malware analyst that has poured his heart and knowledge into his Malware Development training.
I was lucky enough to take his training and I was impressed with his research and knowledge of the subject(s).
I would recommend this training to anyone interest into getting familiar with malware development.
Also mentioned on LinkedIn
Jakub Dzieciątko @aol1306
Mariusz created the best training on malware development I have ever attended and has great teaching skills. He's clearly an expert on the topic and he enjoys sharing his own research. I'm going to recommend his work to anyone interested in red teaming. The things I liked the most about it:
- the amount of useful content
- the materials created in a way I can easily use them later
- inspiring methods of tool creation
- good organization - infection divided into stages, each stage well explained and multiple techniques presented
- going together with the exercises so I could see how you work
- presenting methods to find our own evasion etc techniques
Olivier Lamotte @olamotte33
Throughout the fast-paced training Mariusz took the time to engage with students to make sure every topic became clear. Mariusz's contributions to the offensive security community are always mindful of the impact on the defensive side, which is too rare these days. Thank you for a great training with a ton of actionable content.
Hey guys, I can confirm that me and other guys from our team had a training from Mariusz last week. The framework looks pretty l33t, but I still haven't explored most of it... it is actually pretty big 😄 so, I'm still discovering all the possibilities. The training was amazing and as far as initial access and all kind of tactics to keep your malware undetected are concerned, it was even better than [CUT] or [CUT] 👍🏻