Did you miss Nick Powers' webinar last week? We've got you covered! Watch his full presentation on demand now at https://ghst.ly/45EIyaR.
About us
SpecterOps provides adversary-focused cybersecurity solutions to help organizations understand how threat actors maneuver against them, so they can successfully defend against advanced attacks. SpecterOps replicates adversary tradecraft, hardens systems against the attack cycle, and helps detect current advanced threat actor activity. Service offerings include internal program development, training courses, independent assessment options, and assessment operations support. With knowledge of the adversary, organizations are empowered to successfully prevent against devastating breaches. Contact us at info@specterops.io.
- Website
-
http://www.specterops.io
External link for SpecterOps
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Alexandria, Virginia
- Type
- Privately Held
- Founded
- 2017
- Specialties
- Red Team Operations, Penetration Testing, Hunt Operations, Breach Assessments, Active Directory Security, Security Research, and Adversary Simulation
Products
Locations
-
Primary
100 N Pitt St
Alexandria, Virginia 22314, US
-
307 3rd Ave S
Seattle, Washington 98104, US
Employees at SpecterOps
Updates
-
Want to learn advanced tradecraft to perform adversary simulation ops against enterprise environments, sharpen your offensive technical skills, & learn to evade modern enterprise defenses? Join Elad Shamir & Will S. for our RTO course at #BHUSA! Register: https://ghst.ly/bhusa-rto
-
-
It's #BloodHoundBasics time! ⏰ Want to start with BloodHound but need data? Every fresh install of BHCE has a link (https://lnkd.in/e57Bw4_G) to our sample dataset has everything to get you started with a multi-domain Active Directory environment with AD CS & an Azure tenant. s/o Justin Kohler
-
-
How can tools like BloodHound & FalconHound serve as extensions of your live monitoring capabilities, helping you catch attackers in real-time & limit the impact of breaches? Watch ⛄️ Olaf Hartong's #SOCON2024 talk and find out! https://ghst.ly/4bTIk0X
-
Our team will be at #BHUSA! You can stop by Booth 2600 to chat with the experts and get the latest on BloodHound Enterprise and our suite of open-source tools. Reach out to set up a conversation during the show: https://ghst.ly/bhusa-2024
-
-
Mythic recently got a big update! Check out Cody Thomas' recent conversation with Melvin L. about local agent development for Mythic and learn about some of the new features in Mythic 3.3 Beta. Watch the full stream: https://ghst.ly/4bHKNeQ
-
Dig into Active Directory with us at #BHUSA! Join Hope Walker & Andy Robbins for our AD Security Fundamentals training and learn the key components of AD and get hands-on practice analyzing live AD environments. Aug. 3-4 ▶️ https://ghst.ly/3VdjHGm Aug. 5-6 ▶️ https://ghst.ly/3RjVQUh
-
-
Mark your calendar! Join our upcoming solutions demo and hear from Aaron Smith on how security teams can operationalize continuous Attack Path mapping, measuring impact, and prioritizing mitigation efforts to focus on the most optimal choke points with BloodHound Enterprise. Register today! https://ghst.ly/3W4SBmb
This content isn’t available here
Access this content and more in the LinkedIn app
-
SCCMHunter is a post exploitation framework written in Python designed to streamline identifying, profiling, & attacking SCCM infrastructure and assets in an Active Directory environment. Join Garrett F. for his Arsenal session at #BHUSA to learn more! https://lnkd.in/e5QFDypV
-
-
EDR protections blocking your #phishing payloads? Try writing custom payloads! Whether you have a some experience or none at all, check out this Phishing School blog post from Forrest Kasler for a few tips & tricks for writing a custom payload to bypass EDR. Read more: https://ghst.ly/4fqThKy
-