Red Teamer and Security Addict

enigma0x3

AboutMe

I have presented at Shmoocon Firetalks and several Security BSides conferences on topics covering red team tradecraft and offensive PowerShell. I also co-develop/teach the “Adaptive Red Team Tactics” Black Hat training class.

Twitter: @enigma0x3

Github: https://github.com/enigma0x3

Keybase.io: https://keybase.io/enigma0x3

E-Mail: enigma0x3 [at] gmail [dot] com

Share this:

  • Twitter
  • Facebook

Like this:

Like Loading...

Recent Posts

  • Avira VPN Local Privilege Escalation via Insecure Update Location
  • CVE-2019-19248: Local Privilege Escalation in EA’s Origin Client
  • Avira Optimizer Local Privilege Escalation
  • CVE-2019-13382: Local Privilege Escalation in SnagIt
  • CVE-2019-13142: Razer Surround 1.1.63.0 EoP

Recent Comments

Ron on CVE-2019-13382: Local Privileg…
enigma0x3 on CVE-2019-13382: Local Privileg…
Ron on CVE-2019-13382: Local Privileg…
Soc on Defeating Device Guard: A look…
“Fileless… on “Fileless” UAC Byp…

Archives

  • January 2020
  • December 2019
  • August 2019
  • July 2019
  • March 2019
  • January 2019
  • October 2018
  • June 2018
  • January 2018
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • April 2017
  • March 2017
  • January 2017
  • November 2016
  • August 2016
  • July 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • October 2015
  • August 2015
  • April 2015
  • March 2015
  • January 2015
  • October 2014
  • July 2014
  • June 2014
  • March 2014
  • January 2014

Categories

  • Uncategorized

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com
Blog at WordPress.com.
  • Follow Following
    • enigma0x3
    • Join 183 other followers
    • Already have a WordPress.com account? Log in now.
    • enigma0x3
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: