Signal Labs
@signal_labs
Offensive Security Training @ https://signal-labs.com Samples: https://www.youtube.com/@Signal-Labs Business Inquiries: https://signal-labs.com/business/
You might like
Did you know we have video samples for our courses, including a general overview? They're on our Youtube channel. Here's an example: youtube.com/watch?v=NnxIvD…
youtube.com
YouTube
Signal Labs Trainings
Huge thanks to our Gold sponsor @signal_labs! Leaders in offensive cybersecurity education, offering top-notch training from Aussie roots to global impact. Proud to have them powering skills for our community. Learn more: signal-labs.com
Big thanks to @signal_labs for sponsoring #BSidesCbr2025 at the Gold level! 🏆 We appreciate your support in making this event happen. 🙌 Check out all our amazing sponsors here 👉 bsidescbr.com.au/sponsors.html #ThankYou #CyberSecurity
Our founder and primary instructor Christopher (@Kharosx0) will be representing Signal Labs at @BSidesCbr. Say hi! He will be open for discussions on our offerings and general career or skill related advice to juniors or seniors alike!
Blue-Pill Hypervisor development in our Offensive Tool Development course: ✅ OS agnostic (no_std Rust) ✅ Demonstrated against Windows 11 ✅ Development walkthrough recordings We already have over 40+ hours of content in this course and we've recently expanded it further.…
Looking forward to another great conference in 2024!
Thank you to @signal_labs for their generous Gold sponsorship of #BSidesCbr24! Your support is invaluable to us. 🙌 Explore more about our sponsors at bsidescbr.com.au/sponsors.html
Insight into discovering useful Windows APIs without reverse engineering: signal-labs.com/parsing-msdn-f…
New course for pre-order: Offensive Security Foundations signal-labs.com/trainings/offe… This one has been in demand, our first course tailored for juniors, students and others interested in professionally working in Offensive Security!
As a reminder our team likes to post about offensive security topics incl. 0-day research and publish associated code on our Git. Blog: signal-labs.com/blog/ Git: github.com/signal-labs/ Throwback to a fun 0-day discovery in WeChat desktop+mobile: signal-labs.com/fuzzing-wechat…
Tiny insight into a beginner approach for targeting Hypervisors: signal-labs.com/hypervisor-0da…
We still have seats for our live course on 0-day discovery for modern closed-source Windows targets. Covers advanced fuzzing techniques w/ custom tooling to target kernel, user and hypervisor targets. We also dive into logic bugs and walkthrough 2+ of our own unpublished…
Now accepting registrations for our in-demand live Windows Vulnerability Research & Fuzzing course in February 2024. Registration & more information: signal-labs.com/live-trainings…
Snapshot-fuzzing with tools that don't offer device emulation means your target cannot access devices like the disk during your fuzz case. One example of how we overcome this in our Vulnerability Research training -- hooking and emulating disk-related APIs! We prefer this…
Now accepting registrations for our in-demand live Windows Vulnerability Research & Fuzzing course in February 2024. Registration & more information: signal-labs.com/live-trainings…
Note: Our Hypervisor Internals course is exiting pre-order status and entering full-release shortly! This will come with a price increase, the course details can be found at: signal-labs.com/trainings/hype… A few fun challenges we cover in the course: - Identifying and exploiting an…
Enrolled in our self-paced trainings and want to see something not currently included in the course? Things like reversing or finding 0-days in other custom targets, implementing offensive techniques you're finding difficult, or more? We're taking requests for additional…
We're running a live remote session of our Offensive Tool Development class for Australian and nearby timezones in November! Details & registration at: signal-labs.com/live-trainings…
New post on custom Kernel Drivers for hooking and runtime analysis of other Drivers: signal-labs.com/developing-ker…
United States Trends
- 1. #SmackDown 12.3K posts
- 2. Caleb Wilson 1,449 posts
- 3. Reed Sheppard N/A
- 4. Kansas 22.3K posts
- 5. Darryn Peterson 1,454 posts
- 6. Georgetown 2,760 posts
- 7. Vesia 5,434 posts
- 8. Bryson Tiller 3,467 posts
- 9. End of 1st 1,717 posts
- 10. UMass Lowell N/A
- 11. Dizzy 12K posts
- 12. #GCWUnderstand N/A
- 13. End 1Q N/A
- 14. Grammy 480K posts
- 15. End of the 1st 1,112 posts
- 16. Aleister Black 1,176 posts
- 17. Sam Merrill N/A
- 18. Zelina 1,000 posts
- 19. #KiaraNewOutfit2025 1,264 posts
- 20. Gargano N/A
You might like
-
Thomas Seigneuret
@_zblurx -
waldoirc
@waldoirc -
Corelan Consulting & Training
@corelanconsult -
eversinc33 🤍🔪⋆。˚ ⋆
@eversinc33 -
Eliran Nissan
@eliran_nissan -
FuzzingLabs
@FuzzingLabs -
Dylan Tran
@d_tranman -
assume_breach
@assume_breach -
Steve Eckels
@stevemk14ebr -
BallisKit
@BallisKit -
Christopher
@Kharosx0 -
adm1nkyj
@adm1nkyj1 -
Dima
@DaWouw -
Chris Au
@netero_1010 -
William R. Messmer
@wmessmer
Something went wrong.
Something went wrong.