SANS Offensive Operations (@sansoffensive) 's Twitter Profile
SANS Offensive Operations

@sansoffensive

More Offensive Than Ever
#PenTest | #PurpleTeam | #RedTeam | #ExploitDev
Training, Certification, and Research

ID: 205227620

linkhttps://www.sans.org/u/18R4 calendar_today20-10-2010 12:07:55

19,19K Tweet

70,70K Takipçi

585 Takip Edilen

SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📣 The Hack & Defend Summit CFP closes Monday! We're looking for talks on: 🔘 Red Team case studies 🔘 Exploit Dev & tooling 🔘 Cloud/Offensive AI ...and more! Don't miss this chance to share your knowledge with the community! ➡️ Learn More & Submit: survey.sans.org/jfe/form/SV_37…

📣 The Hack & Defend Summit CFP closes Monday!

We're looking for talks on:
🔘 Red Team case studies
🔘  Exploit Dev & tooling
🔘  Cloud/Offensive AI
...and more!

Don't miss this chance to share your knowledge with the community!

➡️ Learn More & Submit: survey.sans.org/jfe/form/SV_37…
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Join us at #SupplyChainForum when Kasimir Schulz breaks down the hidden risks of open source AI models — licensing conflicts, unsafe code, and backdoors — and how AIBOMs can help. Register for Free: sans.org/u/1B20 #AIsecurity

Join us at #SupplyChainForum when Kasimir Schulz breaks down the hidden risks of open source AI models — licensing conflicts, unsafe code, and backdoors — and how AIBOMs can help.
Register for Free: sans.org/u/1B20
#AIsecurity
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📣 LAST CALL! | The Hack & Defend Summit Call for Presentations CLOSES TODAY at 5pm ET! Topics of interest include, but are not limited to: 🔘 Red Team case studies 🔘 Exploit Dev & tooling 🔘 Cloud/Offensive AI ➡️ Learn More & Submit Your Proposal: survey.sans.org/jfe/form/SV_37…

📣 LAST CALL! | The Hack & Defend Summit Call for Presentations CLOSES TODAY at 5pm ET!

Topics of interest include, but are not limited to:
🔘 Red Team case studies
🔘  Exploit Dev & tooling
🔘  Cloud/Offensive AI

➡️ Learn More & Submit Your Proposal: survey.sans.org/jfe/form/SV_37…
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🔍 Analyzing malware? If you don’t understand calling conventions, you might miss what’s passed where and why it matters. Join Jonathan on June 23 to dive into stdcall, fastcall, and more. 🔗 sans.org/u/1Bu4 #MalwareAnalysis #WinDbg #RedTeam #SEC670

🔍 Analyzing malware? If you don’t understand calling conventions, you might miss what’s passed where and why it matters.

Join <a href="/jon__reiter/">Jonathan</a> on June 23 to dive into stdcall, fastcall, and more.

🔗 sans.org/u/1Bu4

#MalwareAnalysis #WinDbg #RedTeam #SEC670
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🔐 Your code is only as secure as the components you don’t control. Join us on Thursday, June 26 for the SANS Supply Chain Cybersecurity Forum to learn how to defend against hidden threats in software & hardware. ➡️ Register for Free: sans.org/u/1B20

🔐 Your code is only as secure as the components you don’t control.

Join us on Thursday, June 26 for the SANS Supply Chain Cybersecurity Forum to learn how to defend against hidden threats in software &amp; hardware.

➡️ Register for Free: sans.org/u/1B20
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📣 Join us at the SANS Hack & Defend Summit on Oct 28-29 in Austin, TX, for: 💻 Hands-on workshops 🎤 Highly technical talks 👥 One-of-a-kind networking With two simultaneous tracks — Defense & Offense — you can choose your mission! ➡️ Learn More: sans.org/u/1AWB

📣 Join us at the SANS Hack &amp; Defend Summit on Oct 28-29 in Austin, TX, for:

💻 Hands-on workshops
🎤 Highly technical talks 
👥 One-of-a-kind networking

With two simultaneous tracks — Defense &amp; Offense — you can choose your mission!

➡️ Learn More: sans.org/u/1AWB
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🛠️ Want to reverse-engineer with precision? Join Jonathan on June 23 for WinDbg Part 3 and learn how calling conventions like stdcall and fastcall shape real-world analysis. 🔗 sans.org/u/1Bu4 #RedTeam #WinDbg #SEC670 #ReverseEngineering

🛠️ Want to reverse-engineer with precision?

Join <a href="/jon__reiter/">Jonathan</a> on June 23 for WinDbg Part 3 and learn how calling conventions like stdcall and fastcall shape real-world analysis.

🔗 sans.org/u/1Bu4

#RedTeam #WinDbg #SEC670 #ReverseEngineering
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Join us at #SupplyChainForum when Paul Asadoorian exposes the growing risk of firmware attacks—and how they expand the enterprise attack surface across sectors. Register for Free: sans.org/u/1B20 #FirmwareSecurity #CyberSecurity

Join us at #SupplyChainForum when Paul Asadoorian exposes the growing risk of firmware attacks—and how they expand the enterprise attack surface across sectors.
Register for Free: sans.org/u/1B20
#FirmwareSecurity #CyberSecurity
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Join Stephen Sims & John Hubbard in Austin, TX this October at SANS Hack & Defend Summit for hands-on workshops, in-depth talks, & networking w/ industry legends. With two simultaneous tracks — Defense & Offense — you choose your mission. ➡️ Save Your Spot: sans.org/u/1AWB

Join <a href="/Steph3nSims/">Stephen Sims</a> &amp; <a href="/SecHubb/">John Hubbard</a> in Austin, TX this October at SANS Hack &amp; Defend Summit for hands-on workshops, in-depth talks, &amp; networking w/ industry legends. With two simultaneous tracks — Defense &amp; Offense — you choose your mission.

➡️ Save Your Spot: sans.org/u/1AWB
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📞 Are you ready to trace function behavior in WinDbg? Tomorrow, join Jonathan for Part 3 of the Intro to WinDbg series. This time, it’s all about calling conventions and reverse engineering. 📅 June 23 | 3:30 PM EDT 🔗 sans.org/u/1Bu4 #WinDbg #RedTeam

📞 Are you ready to trace function behavior in WinDbg?

Tomorrow, join <a href="/jon__reiter/">Jonathan</a> for Part 3 of the Intro to WinDbg series. This time, it’s all about calling conventions and reverse engineering.

📅 June 23 | 3:30 PM EDT
🔗 sans.org/u/1Bu4

#WinDbg #RedTeam
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🚨 LIVE in 1 hour! Join Jonathan for Part 3 of the WinDbg series. Learn how calling conventions impact your reverse engineering, from stdcall to fastcall. 🔗 sans.org/u/1Bu4 #WinDbg #RedTeam #ReverseEngineering #SEC670

🚨 LIVE in 1 hour!

Join <a href="/jon__reiter/">Jonathan</a> for Part 3 of the WinDbg series. Learn how calling conventions impact your reverse engineering, from stdcall to fastcall.

🔗 sans.org/u/1Bu4

#WinDbg #RedTeam #ReverseEngineering #SEC670
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📢 Now OnDemand! Learn the calling conventions every red teamer and reverse engineer needs. Join Jonathan as he walks through stdcall, fastcall & more in WinDbg Part 3. 📺 Watch now: 🔗 sans.org/u/1Bu4 #WinDbg #RedTeam #ReverseEngineering #SEC670

📢 Now OnDemand!

Learn the calling conventions every red teamer and reverse engineer needs. Join <a href="/jon__reiter/">Jonathan</a> as he walks through stdcall, fastcall &amp; more in WinDbg Part 3.

📺 Watch now: 🔗 sans.org/u/1Bu4

#WinDbg #RedTeam #ReverseEngineering #SEC670
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📣 TOMORROW! | Join us for the Supply Chain Cybersecurity Forum to explore how attackers exploit the digital supply chain — & how you can test, break, & better secure it. 🗓️ Thursday, June 26 | 9am - 12pm ET 🌐 Free Virtual Forum ➡️ Register for Free: sans.org/u/1B20

📣 TOMORROW! | Join us for the Supply Chain Cybersecurity Forum to explore how attackers exploit the digital supply chain — &amp; how you can test, break, &amp; better secure it.

🗓️ Thursday, June 26 | 9am - 12pm ET
🌐 Free Virtual Forum

➡️ Register for Free: sans.org/u/1B20
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📣 Starting in 10 Min! | Join us for the Supply Chain Cybersecurity Forum to explore how attackers exploit the digital supply chain & how you can test, break, & better secure it. 🗓️ Today, 9am-12pm ET 🌐 Free online forum 🔖 Earn 3 CPEs ➡️ Register Free: sans.org/u/1B20

📣 Starting in 10 Min! | Join us for the Supply Chain Cybersecurity Forum to explore how attackers exploit the digital supply chain &amp; how you can test, break, &amp; better secure it.

🗓️ Today, 9am-12pm ET
🌐 Free online forum
🔖 Earn 3 CPEs

➡️ Register Free: sans.org/u/1B20
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Happening now at #SupplyChainForum: Paul Asadoorian is exposing the growing risk of firmware attacks — and how they’re expanding the enterprise attack surface across sectors. It's not too late to Register Free & Join Us: sans.org/u/1B20

Happening now at #SupplyChainForum: Paul Asadoorian is exposing the growing risk of firmware attacks — and how they’re expanding the enterprise attack surface across sectors.

It's not too late to Register Free &amp; Join Us: sans.org/u/1B20
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📣 Join us for the first-ever SANS Hack & Defend Summit this October in Austin, TX, for: 💻 Hands-on workshops 🎤 Highly technical talks 👥 Unmatched networking With two simultaneous tracks — Offense & Defense — you can choose your mission! ➡️ Register: sans.org/u/1AWB

📣 Join us for the first-ever SANS Hack &amp; Defend Summit this October in Austin, TX, for:

💻 Hands-on workshops
🎤 Highly technical talks
👥 Unmatched networking

With two simultaneous tracks — Offense &amp; Defense — you can choose your mission!

➡️ Register: sans.org/u/1AWB
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Join Stephen Sims & John Hubbard in Austin, TX this October at SANS Hack & Defend Summit for hands-on workshops, in-depth talks, & networking w/ industry legends. With two simultaneous tracks — Defense & Offense — you choose your mission. ➡️ Save Your Spot: sans.org/u/1AWB

Join <a href="/Steph3nSims/">Stephen Sims</a> &amp; <a href="/SecHubb/">John Hubbard</a> in Austin, TX this October at SANS Hack &amp; Defend Summit for hands-on workshops, in-depth talks, &amp; networking w/ industry legends. With two simultaneous tracks — Defense &amp; Offense — you choose your mission.

➡️ Save Your Spot: sans.org/u/1AWB
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

📣 Join us for the first-ever SANS Hack & Defend Summit this October in Austin, TX, for: 💻 Hands-on workshops 🎤 Highly technical talks 👥 Unmatched networking With two simultaneous tracks — Offense & Defense — you can choose your mission! ➡️ Register: sans.org/u/1AWB

📣 Join us for the first-ever SANS Hack &amp; Defend Summit this October in Austin, TX, for:

💻 Hands-on workshops
🎤 Highly technical talks
👥 Unmatched networking

With two simultaneous tracks — Offense &amp; Defense — you can choose your mission!

➡️ Register: sans.org/u/1AWB
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🎉 The new Core #NetWars has landed! Version 11 delivers #AI-driven puzzles, retro-futuristic battle chaos, and a dynamic range to test your offensive + defensive cyber skills across complex threats. 🚀 Blog: sans.org/u/1BVa #CyberRange

🎉 The new Core #NetWars has landed!

Version 11 delivers #AI-driven puzzles, retro-futuristic battle chaos, and a dynamic range to test your offensive + defensive cyber skills across complex threats.

🚀 Blog: sans.org/u/1BVa

#CyberRange
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Join Stephen Sims & John Hubbard in Austin, TX this October at SANS Hack & Defend Summit for hands-on workshops, in-depth talks, & networking w/ industry legends. With two simultaneous tracks — Offense & Defense — you choose your mission. ➡️ Save Your Spot: sans.org/u/1AWB

Join <a href="/Steph3nSims/">Stephen Sims</a> &amp; <a href="/SecHubb/">John Hubbard</a> in Austin, TX this October at SANS Hack &amp; Defend Summit for hands-on workshops, in-depth talks, &amp; networking w/ industry legends. With two simultaneous tracks — Offense &amp; Defense  — you choose your mission.

➡️ Save Your Spot: sans.org/u/1AWB