signal_labs's profile picture. Offensive Security Training @ https://signal-labs.com

Samples: https://www.youtube.com/@Signal-Labs

Business Inquiries: https://signal-labs.com/business/

Signal Labs

@signal_labs

Offensive Security Training @ https://signal-labs.com Samples: https://www.youtube.com/@Signal-Labs Business Inquiries: https://signal-labs.com/business/

Pinned

Did you know we have video samples for our courses, including a general overview? They're on our Youtube channel. Here's an example: youtube.com/watch?v=NnxIvD…

signal_labs's tweet card. Signal Labs Trainings

youtube.com

YouTube

Signal Labs Trainings


Signal Labs reposted

Huge thanks to our Gold sponsor @signal_labs! Leaders in offensive cybersecurity education, offering top-notch training from Aussie roots to global impact. Proud to have them powering skills for our community. Learn more: signal-labs.com


We've added a few more lesson samples to our channel: youtube.com/@Signal-Labs


Signal Labs reposted

Big thanks to @signal_labs for sponsoring #BSidesCbr2025 at the Gold level! 🏆 We appreciate your support in making this event happen. 🙌 Check out all our amazing sponsors here 👉 bsidescbr.com.au/sponsors.html #ThankYou #CyberSecurity


Our founder and primary instructor Christopher (@Kharosx0) will be representing Signal Labs at @BSidesCbr. Say hi! He will be open for discussions on our offerings and general career or skill related advice to juniors or seniors alike!


Blue-Pill Hypervisor development in our Offensive Tool Development course: ✅ OS agnostic (no_std Rust) ✅ Demonstrated against Windows 11 ✅ Development walkthrough recordings We already have over 40+ hours of content in this course and we've recently expanded it further.…

signal_labs's tweet image. Blue-Pill Hypervisor development in our Offensive Tool Development course:

✅ OS agnostic (no_std Rust)
✅ Demonstrated against Windows 11
✅ Development walkthrough recordings

We already have over 40+ hours of content in this course and we've recently expanded it further.…

Looking forward to another great conference in 2024!

Thank you to @signal_labs for their generous Gold sponsorship of #BSidesCbr24! Your support is invaluable to us. 🙌 Explore more about our sponsors at bsidescbr.com.au/sponsors.html



New course for pre-order: Offensive Security Foundations signal-labs.com/trainings/offe… This one has been in demand, our first course tailored for juniors, students and others interested in professionally working in Offensive Security!


As a reminder our team likes to post about offensive security topics incl. 0-day research and publish associated code on our Git. Blog: signal-labs.com/blog/ Git: github.com/signal-labs/ Throwback to a fun 0-day discovery in WeChat desktop+mobile: signal-labs.com/fuzzing-wechat…


We still have seats for our live course on 0-day discovery for modern closed-source Windows targets. Covers advanced fuzzing techniques w/ custom tooling to target kernel, user and hypervisor targets. We also dive into logic bugs and walkthrough 2+ of our own unpublished…

Now accepting registrations for our in-demand live Windows Vulnerability Research & Fuzzing course in February 2024. Registration & more information: signal-labs.com/live-trainings…



Snapshot-fuzzing with tools that don't offer device emulation means your target cannot access devices like the disk during your fuzz case. One example of how we overcome this in our Vulnerability Research training -- hooking and emulating disk-related APIs! We prefer this…

signal_labs's tweet image. Snapshot-fuzzing with tools that don't offer device emulation means your target cannot access devices like the disk during your fuzz case.

One example of how we overcome this in our Vulnerability Research training -- hooking and emulating disk-related APIs!

We prefer this…

Now accepting registrations for our in-demand live Windows Vulnerability Research & Fuzzing course in February 2024. Registration & more information: signal-labs.com/live-trainings…


Note: Our Hypervisor Internals course is exiting pre-order status and entering full-release shortly! This will come with a price increase, the course details can be found at: signal-labs.com/trainings/hype… A few fun challenges we cover in the course: - Identifying and exploiting an…


Enrolled in our self-paced trainings and want to see something not currently included in the course? Things like reversing or finding 0-days in other custom targets, implementing offensive techniques you're finding difficult, or more? We're taking requests for additional…


We're running a live remote session of our Offensive Tool Development class for Australian and nearby timezones in November! Details & registration at: signal-labs.com/live-trainings…


Loading...

Something went wrong.


Something went wrong.