arrow-right-down binary-offensive.com


Home Software Trainings Subscribe Blog Contact

Offensive Security
Trainings offering


Throughout my career I've been delivering multiple public and internal company trainings on varying IT Security related topics, ranging from Malware Analysis, Penetration Testing, up to Red Teaming and Active Directory exploitation. With a total experience as a Trainer exceeding 4 years already, I can now confidently offer a fresh & new set of Offensive Security courses.

If you want to delve deeper into Malware Development, Initial Access and Red Team tactics concepts - take a look at the below courses collection!

Oferred trainings:

Modern Initial Access
and Evasion Tactics




What others
think about my trainings?


Today was the last day of @mariuszbit's training. I can honestly recommend it to anyone, who is interested in Red Teaming. Content is great and I can't wait to deploy some novel initial access techniques. Wanna decrease detection rate of your implants? Then,this is a no-brainer👍

— Jan Kopecky (@rnmx123) October 21, 2022

Image

Petko Melin @petkomelin
I recently completed the course "Modern Red Team Malware Tactics" and was very impressed with the level of instruction and the practical knowledge I gained.

I highly recommend the course to anyone who wants to dive deep into practical Initial Access strategies and learn more about implementing some of the most modern tactics for Initial Breach during a Red Team exercise.

The instructor of the course was the very experienced and talented red teamer Mariusz Banach, who has a wealth of experience in the field and was able to provide valuable insights from his heavy research and real-world examples throughout the course.

Posted on LinkedIn

Image

Adrian Dinca @adrian-dinca
Aight, I need a break after this one 😵
On the first day Mariusz mentioned that he will be delivering a lot of information. I called that a bluff. Oh boy was I wrong... The "Modern Red Team Malware Development Strategies" training is a beast.
The information is top notch, some undocumented attack paths/tricks, great private tools to aid the process and Mariusz does a great job presenting all this.
Participants beware: there WILL BE A TON of information which needs to be assimilated, but it is all worth the effort.
Definitely recommending this to anyone that needs to expand their knowledge regarding malware (both from a red as well as blue team perspective) Thank you Mariusz Banach

Posted on LinkedIn

Image

Ivan Da Silva @humble_desser
Mariusz Banach is a red team operator and former malware analyst that has poured his heart and knowledge into his Malware Development training.
I was lucky enough to take his training and I was impressed with his research and knowledge of the subject(s).
I would recommend this training to anyone interest into getting familiar with malware development.

Also mentioned on LinkedIn

Image

Jakub Dzieciątko @aol1306
Mariusz created the best training on malware development I have ever attended and has great teaching skills. He's clearly an expert on the topic and he enjoys sharing his own research. I'm going to recommend his work to anyone interested in red teaming. The things I liked the most about it:
- the amount of useful content
- the materials created in a way I can easily use them later
- inspiring methods of tool creation
- good organization - infection divided into stages, each stage well explained and multiple techniques presented
- going together with the exercises so I could see how you work
- presenting methods to find our own evasion etc techniques

Image

Olivier Lamotte @olamotte33
Throughout the fast-paced training Mariusz took the time to engage with students to make sure every topic became clear. Mariusz's contributions to the offensive security community are always mindful of the impact on the defensive side, which is too rare these days. Thank you for a great training with a ton of actionable content.

Image

anonymized @anonymized
Hey guys, I can confirm that me and other guys from our team had a training from Mariusz last week. The framework looks pretty l33t, but I still haven't explored most of it... it is actually pretty big 😄 so, I'm still discovering all the possibilities. The training was amazing and as far as initial access and all kind of tactics to keep your malware undetected are concerned, it was even better than [CUT] or [CUT] 👍🏻

Copyright © 2022 binary-offensive.com | designed by www.ombre.tech