CodeMachine Inc.
@codemachineinc
Security Research and Training
You might like
I really love the Windows Kernel Rootkit Techniques training! It was such an intensive training runs in 4 days! Thank you @codemachineinc #BlackHat2023
I've been lucky enough to attend the Windows Kernel #Rootkit at #BHUS23 from @codemachineinc 4 days of tremendous knowledge! Highly recommended! Lots of hands on labs and updated material, other then a knowledgeable instructor that make easy the stuff the #Microsoft complicate.
If the Windows Internals were a person, that person would be called @codemachineinc. Just finished the amazing Windows Kernel Rootkit Techniques training by T.Roy at @BlackHatEvents. Would highly recommend this to anyone interested in the Windows kernel! #BHUSA #BlackHat2023
Just finished @codemachineinc 's Windows Rootkit Techniques course, hands down, the best training I've ever taken. I recommend to anyone to attend at least one of T.roy's courses during his lifetime.
@codemachineinc absolutely incredible training!! Just did the windows rootkit training and I learned SO MUCH! I cannot recommend this course enough! #rootkit #BlackHat2023 #training
Just completed the WINMAL training with @codemachineinc and I must say, it was hands down the best malware training I've ever taken. The instructor was incredibly knowledgeable and focused mainly on hands-on labs, Thanks to the exceptional training
Looking to start Windows MalDev, or already started and looking for a good course on it? Just finished @codemachineinc WINMAL class, and I can highly recommend it. One of the best trainings I've taken, T. Roy is an excellent instructor. 👍👍
If your interested in windows malware development, definitely recommend taking @codemachineinc WINMAL class. He’s definitely a wizard at what he does and doesn’t just teach you how to do it, but the why and goes in-depth with each technique shown in the course! Highly Recommend🔥
3/3 A massive thank you to T.Roy and the whole @codemachineinc team. See you in your next classes!
2/3 Additionally, the material provided during the training, will continue to be a valuable resource even after the course has ended. The instructors extensive experience, was evident in the abundance of undocumented knowledge and personal experiences shared during the training.
1/3 I attended the Windows Malware Techniques course from @codemachineinc, and what a ride it was! If you're interested in really understanding how malware operates and the surrounding concepts works under the hood, then this is the training for you. codemachine.com/trainings/winm…
Secure pool allocation with ExAllocatePool3(), PoolExtendedParameterSecurePool & POOL_EXTENDED_PARAMS_SECURE_POOL. Happy New Year.
If you want to learn advanced attack and defense techniques on Windows kernel, then you should attend the @codemachineinc Windows Kernel Rootkit Techniques training. I enjoyed with this training at Black Hat USA 2022. Thanks T-Roy and CodeMachine for such an awesome training.
i am blown away by the quality of content and instruction in the @codemachineinc Kernel Rootkit Techniques at Blackhat. T.Roy is a very knowledgable instructor, looking forward to taking more classes from them in the future. loved every minute of the class, 12/10 recommend
Just finished the @codemachineinc Windows Malware Techniques class. Easily the best technical training I've done, highly recommended. codemachine.com/trainings/winm…
@codemachineinc An excellent class I just completed for the Windows Malware Class from T.Roy Complete Dev/Analyst perspective and excellent walkthroughs in understanding the Malware/RE/Forensics analysis landscape.
Interested in #CyberSecurity? Excellent classes are available from @codemachineinc
just finished an great training of WinMal with T.Roy @ @codemachineinc , sophisticated labs and great materials, highly recommended!
Thank you for your kind words.
What an awesome training led by Mr. T Roy from codemachine. The training was conducted with the most high quality standards and the content provided was top-notch training to explore deeply the post-exploitation techniques used by modern Windows Kernel rootkits. @codemachineinc
United States Trends
- 1. Penn State 23.2K posts
- 2. Indiana 38.7K posts
- 3. Mendoza 20.2K posts
- 4. Gus Johnson 6,764 posts
- 5. #UFCVegas111 5,107 posts
- 6. #iufb 4,197 posts
- 7. Sayin 69.2K posts
- 8. Omar Cooper 9,572 posts
- 9. Iowa 19.5K posts
- 10. Estevao 39.1K posts
- 11. Josh Hokit N/A
- 12. Sunderland 155K posts
- 13. Mizzou 3,730 posts
- 14. Kirby Moore N/A
- 15. Texas Tech 13.9K posts
- 16. Jim Knowles N/A
- 17. Happy Valley 1,908 posts
- 18. James Franklin 8,851 posts
- 19. Carter Smith N/A
- 20. Oregon 33.7K posts
You might like
-
Ori Damari
@0xrepnz -
REcon
@reconmtl -
Pavel Yosifovich
@zodiacon -
Ido Veltzman
@Idov31 -
REhints
@REhints -
Yarden Shafir
@yarden_shafir -
Matt Hand
@matterpreter -
spotheplanet
@spotheplanet -
Andrea Allievi
@aall86 -
SEKTOR7 Institute
@SEKTOR7net -
Connor McGarr
@33y0re -
Stephen Fewer
@stephenfewer -
Alex Ionescu
@aionescu -
namazso
@namazso -
Emeric Nasi
@EmericNasi
Something went wrong.
Something went wrong.