Offensive Security
Trainings offering
If you want to delve deeper into Malware Development, Initial Access and Red Team tactics concepts - take a look at the below courses collection!
Oferred trainings:
What others
think about my trainings?
Pierre @pruno9
Mgeeky really knows its subject and succeeds at transmiting the core concept in a limited amount of time.
Even for the parts he claims not knowing very well he still took the time to do the research to give us some basic concepts to expand on.
Too bad Microsoft pretty much killed macros because Mgeeky really worked on that and it shows, still very interesting even less usable than before.
In summary, a very interesting course with actually usable and facilitated (with mgeeky's provided tools) tactics.
Stefan Bauregger
Mgeeky shows in this training that he is a top-notch red teamer and shares his knowledge, insights and war-stories.
It was amazing to hear about his methodology and to get access to some of his tooling.
Dipen Patel
Marius is exceptional with his course, content.
I have learned a lot of new things during the class, the course is up to date with real world examples.
I highly recommend this course to anyone who seeking to learn new things or upgrade their current knowledge.
Ivan Da Silva @humble_desser
Mariusz Banach is a red team operator and former malware analyst that has poured his heart and knowledge into his Malware Development training.
I was lucky enough to take his training and I was impressed with his research and knowledge of the subject(s).
I would recommend this training to anyone interest into getting familiar with malware development.
Also mentioned on LinkedIn
Jakub Dzieciątko @aol1306
Mariusz created the best training on malware development I have ever attended and has great teaching skills. He's clearly an expert on the topic and he enjoys sharing his own research. I'm going to recommend his work to anyone interested in red teaming. The things I liked the most about it:
- the amount of useful content
- the materials created in a way I can easily use them later
- inspiring methods of tool creation
- good organization - infection divided into stages, each stage well explained and multiple techniques presented
- going together with the exercises so I could see how you work
- presenting methods to find our own evasion etc techniques
Olivier Lamotte @olamotte33
Throughout the fast-paced training Mariusz took the time to engage with students to make sure every topic became clear. Mariusz's contributions to the offensive security community are always mindful of the impact on the defensive side, which is too rare these days. Thank you for a great training with a ton of actionable content.
Today was the last day of @mariuszbit's training. I can honestly recommend it to anyone, who is interested in Red Teaming. Content is great and I can't wait to deploy some novel initial access techniques. Wanna decrease detection rate of your implants? Then,this is a no-brainer👍
— Jan Kopecky (@rnmx123) October 21, 2022
anonymized @anonymized
Hey guys, I can confirm that me and other guys from our team had a training from Mariusz last week. The framework looks pretty l33t, but I still haven't explored most of it... it is actually pretty big 😄 so, I'm still discovering all the possibilities. The training was amazing and as far as initial access and all kind of tactics to keep your malware undetected are concerned, it was even better than [CUT] or [CUT] 👍🏻
Copyright © 2022 binary-offensive.com | designed by www.ombre.tech