Skip to main content
Suzu Logo
  • Home
  • Products
  • Services
    • Offensive Security
    • Defensive Security
    • AI Advisory
    • AI Assessment
    • AI Integration
  • About
    • About Us
    • FAQ's
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Contact Us
Back to Blog
Briefing Room

SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers

Dahvid Schloss January 29, 2026 10 min read
Table of Contents

    This article is in reference to our newest POC hosted on GitHub here: https://github.com/Emulated-Criminals/SilentFrame

    For the last two weeks, the team and I have been working on a project we are calling Playbook, which is a quick-reference cheat sheet website to help fellow offensive security professionals quickly determine how to run a specific application or attempt a new technique they haven’t tried before.

    More to come on Playbook later, but while writing these cheat sheets, we stumbled across a cool technique for collecting credentials on [Ired.team] knowledge repo.

    (https://www.ired.team/offensive-security/credential-access-and-credential-dumping/stealing-web-application-credentials-by-hooking-input-fields)

    t=""; $('input[type="password"]').onkeypress = function (e) { t+=e.key; console.log(t); localStorage.setItem("pw", t); }
    javascript

    This one-liner hooks the input field labeled “password” and prints each key to the console. In other words, it’s a keylogger that logs only the password field of the tab. While this technique was promising, its use was impractical from an adversarial emulation/red teaming perspective.

    In order for this attack to work, we would need:

    1. RDP access into the host, for the user that we wish to target

    2. The username for the specific tab we are hooking, and

    3. The website we wanted to target already open.

    Each of those three items alone is a threat actor’s no-go when considering OPSEC and stealth. So, we decided to take a break from developing the markdown files for Playbook and began devising how we could take this attack to the next level.

    It should be no surprise that we, just like threat actors, love poisoning-the-well type attacks. If you are unfamiliar with what that type of attack is, it’s where the Threat Actor takes a commonly used, legitimate file, application, system, etc., and modifies it to act as the initiation point of the attack. A common poisoning-the-well attack is to open a commonly used Excel or Word document on a shared drive and add a macro that executes a malicious script. This works far better than attempting to use that document from a phishing perspective because it doesn’t carry the Mark-of-the-Web and is given more leeway in execution. Additionally, people are less likely to be concerned about an existing, previously used internal document, since it doesn’t follow preconceived notions of where threats come from.

    So, how do we take the one-liner and turn it into a poisoning-the-well type attack? The first thing we needed to determine was how we could interact with the browser without using a GUI interface. We determined that the most realistic attack path would start from a C2 Agent, where console intractability is achieved, but synchronous desktop interaction is not achieved, or is not feasible, for maintaining stealth. This is where the Chrome DevTools Protocol (CDP) comes in. CDP is a legitimate remote debugging API that is included in Chrome and Edge, as they are Chromium-based browsers. It exists to enable developers to introspect, automate, and debug the browser and, when engaged, it exposes a control plane via a local WebSocket that can observe and manipulate the browser’s state well below the DOM and origin boundaries that most security controls address.

    Now, CDP isn’t something you can just turn on while the browser is running. It requires that the browser be executed with the `--remote-debugging-port=9222` flag, and then, and only then, is that specific browser instance initiated with the remote debugger. Any other existing browser instance will not be affected.  Now, “crashing” and auto-restarting a program isn’t hard, and is quite an effective trick against most non-technical users, but what if we could make it more persistent than that? We decided the best way to poison the well would be to modify the shortcut file itself to always execute with the CDP flag. To do that, a quick 5 lines in PowerShell can accomplish what we need.

    Here’s an example using MS Edge:

    $wsh = New-Object -ComObject WScript.Shell
    $sc  = $wsh.CreateShortcut("$env:USERPROFILE\Desktop\Microsoft Edge.lnk")
    $sc.TargetPath = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
    $sc.Arguments  = "--remote-debugging-port=9222"
    $sc.Save()
    powershell

    Or if we wanted to accomplish that in one line:

    $sc=(New-Object -ComObject WScript.Shell).CreateShortcut("$env:USERPROFILE\Desktop\Microsoft Edge.lnk");$sc.Arguments=($sc.Arguments+" --remote-debugging-port=9222").Trim();$sc.Save()
    powershell

    Once we established a way to create a persistent interface, we began crafting SilentFrame, a PowerShell script that would connect to the CDP interface, monitor for navigation and page renderers and, every time a tab would render a new page, inject a JavaScript DOM API based key logging string.

    Our Final Result would look as such:

    Fig 1. Hooked Shodan.io login page

    Fig 2. SilentFrame logging and printing the user/pass

    High-Level Technical Breakdown

    SilentFrame starts by querying `http://127.0.0.1:9222/json/version`, which is the CDP discovery endpoint exposed by the browser when remote debugging is enabled. This endpoint returns metadata about the running browser instance, including the `webSocketDebuggerUrl`, which represents the browser’s primary control channel. It then establishes a single browser-level WebSocket connection to this endpoint rather than opening a per-tab connection, enabling it to operate as a centralized observer and controller. 

    Once connected, SilentFrame enables target discovery and automatic attachment by invoking `Target.setDiscoverTargets` and `Target.setAutoAttach`. This places the browser into an observable state where all existing and future targets, including tabs, iframes, and background pages, emit lifecycle events. Any newly created targets are automatically attached to the session without operator intervention, while targets that existed prior to the connection are enumerated using `Target.getTargets` and manually attached via the `Target.attachToTarget` function.

    As targets are attached, SilentFrame maintains an internal mapping of `targetId` to `sessionId`. This mapping helps tremendously, as all subsequent CDP messages are multiplexed over the same WebSocket and must be demultiplexed to attribute events, logs, and script execution to the correct browsing context. At this point within the script, SilentFrame has persistent, browser-wide visibility into tab creation, navigation, and teardown without ever interacting with the desktop or browser UI. We purposely left artifacts within the POC so as not to just hand a dangerous weapon over to those with less morals, but it could be modified to remove these artifacts with the proper background knowledge.

    For each attached target, SilentFrame waits until a valid web context exists before enabling higher-level domains. In this context, domain isn’t referring to a hosted named location, like a webpage, but instead a functional internal namespace within CDP, like `Runtime` or `Page`. Once a target resolves to an HTTP or HTTPS URL, it enables the `Runtime`, `Page`, and `Log` domains and turns on lifecycle event reporting. This ensures that the attack mechanism occurs only for actual web content, not for internal browser pages or transient targets.

    From there, SilentFrame operates as a passive listener with selective active execution. It consumes messages forwarded through `Target.receivedMessageFromTarget`, logging console output, runtime exceptions, page lifecycle events, and other execution signals in real time. We decided that all message types should be consumed for debugging and visibility, though in practice, this can be reduced to a smaller subset focused on DOM activity, navigation events, runtime evaluation, and logging for brevity of logging without impacting functionality.

    On `DOMContentLoaded`, a single JavaScript payload is injected using `Runtime.evaluate`, tracked with a unique message identifier to confirm execution and capture results. The page continues to load and function normally, but its execution environment now includes our script operator as an observer.

    Defensive Considerations

    From a defensive standpoint, SilentFrame doesn’t exploit the browser so much as it repurposes its debugging understructure. This is becoming a much more common attack path as Threat Actors increasingly prioritize using existing systems, as they are less strictly monitored.  During testing, we ran this against multiple endpoint security platforms, including CrowdStrike Falcon; no alerts were generated for this activity. It is worth noting that one of our malware developers pointed out that the test system running Falcon was not running it in its most aggressive enforcement mode, and that similar techniques have previously encountered friction under that mode. Regardless, the behavior itself was undetected even under enforcement conditions more restrictive than default.

    Detection and prevention of this proof-of-concept, or others similar to it, hinge less on the JavaScript executed within the browser and more on the conditions that enable CDP access in the first place. High-confidence indicators include Chromium-based browsers launched with the `--remote-debugging-port` flag, persistent local WebSocket connections to 127.0.0.1, and repeated use of the CDP `Target` domain consistent with automation or instrumentation workflows. When correlated together, these signals strongly suggest that the browser’s control plane has been externally attached, even if the browser’s visible behavior remains unchanged.

    The best way to monitor for these would be to use a tool like SysInternal’s Sysmon ingested into your SIEM.

    For process-level detection, the anchor event is Sysmon `Event ID 1, Process Create`. This is where you catch the Chromium-based browsers being launched with non-standard command-line arguments. You’re specifically looking for `msedge.exe`, `chrome.exe`, or other Chromium derivatives where the `CommandLine` field contains `--remote-debugging-port`. That flag alone isn’t malicious, but in user workstations it is rare enough to be a meaningful starting condition. If you already log parent process information, correlating the browser launch back to `explorer.exe` versus a background process or script host adds even more context. 

    For the control channel itself, `Sysmon Event ID 3, Network Connection`, is the next high-signal source. This event will show loopback connections to `127.0.0.1` on the specified debugging port, typically `9222` but not always as the debugging flag allows for any port to be specified. Normal browsing does not involve persistent loopback TCP connections to the browser process, so a long-lived or repeatedly re-established connection to `localhost` tied to a Chromium PID is a strong indicator that CDP is in use. When you can correlate `Event ID 3` back to a browser process previously flagged in `Event ID 1`, the confidence jumps significantly.

    If you want to catch the “poisoning-the-well” setup step rather than just the runtime behavior, `Sysmon Event ID 11`, File Create, is useful for monitoring `.lnk` modifications in user-accessible locations such as the Desktop, Start Menu, or Taskbar pin directories. Changes to existing browser shortcuts, especially when followed by a browser relaunch with modified arguments, form a clean before-and-after trail that is easy to explain to incident responders.

    Optionally, `Sysmon Event ID 7`, Image Load, can provide supporting context by showing script engines or unusual modules being loaded into non-interactive processes that later establish loopback connections to the browser. This is not a primary signal, but it helps distinguish developer tooling from malicious automation during deeper triage.

    Testing Results

    The following vendor detection table presents our test results on whether the action was detected by the vendor. This table is only relevant as of 01-29-2026. Any testing conducted after this date may yield different results.

    SilentFrame Vendor Detection as of January 29, 2026

    Share
    Tags: Briefing Room
    Dahvid Schloss

    Dahvid is our Emulated Mob Boss. He began his career journey as a Special Operations RTO/Communication operator before pivoting into Offensive Cyber Operations in the military. From there, he tormented a prominent Big 4 consulting firm with his red teaming prowess before moving into director-level offensive security roles at smaller organizations.

    Stay ahead of the threat landscape

    AI security insights, threat intelligence, and research from our team. No spam, unsubscribe anytime.

    Subscribe
    ← Previous Brightspeed Breach: Crimson Collective and the Infostealer Problem Next → Under Armour Breach: What The Forum Data Actually Shows

    Latest Posts

    View All
    When Elite Cyber Teams Can't Crack Web Security
    Cybersecurity
    Apr 23, 2026 Jacob Krell

    When Elite Cyber Teams Can't Crack Web Security

    HTB's 2025 benchmark tested 796 security teams. Only 21% passed web security challenges. The Security Illusion Security ...

    Read More: When Elite Cyber Teams Can't Crack Web Security
    The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them
    Cybersecurity
    Apr 22, 2026 Jacob Krell

    The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them

    In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. ...

    Read More: The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them
    Suzu Labs Acquires Emulated Criminals
    Apr 20, 2026 Hannah Perez

    Suzu Labs Acquires Emulated Criminals

    Bridging the gap between theory and the threat reality, Suzu Labs is proud to announce the acquisition of Emulated ...

    Read More: Suzu Labs Acquires Emulated Criminals
    The Wall Around Claude 4.7 Does Not Extend to Dread
    Cybersecurity
    Apr 17, 2026 Suzu Labs

    The Wall Around Claude 4.7 Does Not Extend to Dread

    Anthropic released Claude Opus 4.7 on April 16, 2026 with automated cybersecurity safeguards and a Cyber Verification ...

    Read More: The Wall Around Claude 4.7 Does Not Extend to Dread
    The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control
    youtube
    Apr 10, 2026 Jacob Krell

    The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control

    Earlier this year, YouTube began rolling out a row of algorithmically recommended videos at the top of the ...

    Read More: The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control
    The AI Revolution: How Jobs Will Change by 2030
    Cybersecurity
    Apr 07, 2026 Suzu Labs

    The AI Revolution: How Jobs Will Change by 2030

    Host Phillip Wylie sits down with Nicolas Chaillan to discuss the sobering reality of AI replacement, the critical need ...

    Read More: The AI Revolution: How Jobs Will Change by 2030
    The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?
    Generative AI
    Apr 01, 2026 Hannah Perez

    The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?

    In late 2024, Sydney tech entrepreneur Paul Conyngham was told his rescue dog, Rosie, had months to live. She was ...

    Read More: The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?
    From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone
    Cybersecurity
    Mar 30, 2026 Suzu Labs

    From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone

    The world of cybersecurity has undergone a massive transformation in just a few decades. In this episode of Simply ...

    Read More: From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone
    While TSA Made Headlines, CISA Went Dark
    Critical Infrastructure
    Mar 30, 2026 Jacob Krell

    While TSA Made Headlines, CISA Went Dark

    The Department of Homeland Security has been partially shut down for over 45 days. In that time, 460 TSA officers have ...

    Read More: While TSA Made Headlines, CISA Went Dark
    The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks
    AI Security
    Mar 30, 2026 Suzu Labs

    The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks

    In cybersecurity, we often operate in silos. The red team breaks things, the blue team fixes them, and management ...

    Read More: The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks
    Claude Mythos and the Cybersecurity Risk That Was Already Here
    Threat Intelligence
    Mar 27, 2026 Jacob Krell

    Claude Mythos and the Cybersecurity Risk That Was Already Here

    On March 26, Anthropic confirmed the existence of Claude Mythos, an unreleased AI model described internally as "a step ...

    Read More: Claude Mythos and the Cybersecurity Risk That Was Already Here
    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Critical Infrastructure
    Mar 26, 2026 Mike Bell

    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It

    Rapid7's research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here's what ...

    Read More: BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    Cybersecurity
    Mar 23, 2026 Hannah Perez

    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026

    We are incredibly proud to announce a monumental achievement. At this year’s Global InfoSec Awards 2026, hosted by ...

    Read More: Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity
    Cybersecurity
    Mar 17, 2026 Suzu Labs

    From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity

    In the world of cybersecurity, we often talk about "gatekeeping" or the "skills gap," but rarely do we find individuals ...

    Read More: From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity
    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    Cybersecurity
    Mar 16, 2026 Phillip Wylie

    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

    The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, ...

    Read More: Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Critical Infrastructure
    Mar 13, 2026 Denis Calderone

    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time

    On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The ...

    Read More: From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    Social Engineering
    Mar 09, 2026 Suzu Labs Intelligence

    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation

    Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. ...

    Read More: Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    Threat Intelligence
    Mar 06, 2026 Mike Bell

    The Company Reviewing Your Meta Glasses Footage Has a Security Problem

    Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...

    Read More: The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    CTF
    Mar 03, 2026 Jacob Krell

    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

    View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...

    Read More: The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Cybersecurity
    Mar 03, 2026 Phillip Wylie

    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell

    In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration ...

    Read More: Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Anthropic and Claude: 2026 AI Powerhouse
    Supply Chain Security
    Feb 26, 2026 Hannah Perez

    Anthropic and Claude: 2026 AI Powerhouse

    In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...

    Read More: Anthropic and Claude: 2026 AI Powerhouse
    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Cybersecurity
    Feb 24, 2026 Phillip Wylie

    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle

    In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and ...

    Read More: Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Cybersecurity
    Feb 17, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown

    In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware ...

    Read More: Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Cybersecurity
    Feb 12, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...

    Read More: Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Threat Intelligence
    Feb 10, 2026 Phillip Wylie

    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

    Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the ...

    Read More: Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Under Armour Breach: What The Forum Data Actually Shows
    Threat Intelligence
    Jan 30, 2026 Mike Bell

    Under Armour Breach: What The Forum Data Actually Shows

    On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...

    Read More: Under Armour Breach: What The Forum Data Actually Shows
    SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers
    Briefing Room
    Jan 29, 2026 Dahvid Schloss

    SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers

    This article is in reference to our newest POC hosted on GitHub here: https://github.com/Emulated-Criminals/SilentFrame ...

    Read More: SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers
    Brightspeed Breach: Crimson Collective and the Infostealer Problem
    Threat Intelligence
    Jan 20, 2026 Mike Bell

    Brightspeed Breach: Crimson Collective and the Infostealer Problem

    Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...

    Read More: Brightspeed Breach: Crimson Collective and the Infostealer Problem
    When Grid Data Goes Dark Web
    Power Grid
    Jan 19, 2026 Mike Bell

    When Grid Data Goes Dark Web

    Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...

    Read More: When Grid Data Goes Dark Web
    The $150,000 Password
    Critical Infrastructure
    Jan 19, 2026 Mike Bell

    The $150,000 Password

    How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...

    Read More: The $150,000 Password
    Seeing Everything, Understanding Nothing
    Briefing Room
    Jan 16, 2026 Dahvid Schloss

    Seeing Everything, Understanding Nothing

    To help you get a head start on making your environment safer and in keeping with the theme of January’s “New Year, New ...

    Read More: Seeing Everything, Understanding Nothing
    New Year, New Priorities - So, what to fix first?
    Briefing Room
    Jan 08, 2026 Dahvid Schloss

    New Year, New Priorities - So, what to fix first?

    The most common phrase we hear from our prospects is, “We are overwhelmed, and we aren’t sure what to tackle first.” ...

    Read More: New Year, New Priorities - So, what to fix first?
    UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)
    Briefing Room
    Nov 21, 2025 Dahvid Schloss

    UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)

    Repository purpose: this research was to evaluate the feasiabilty of using Alternate Data Stream (ADS) in staging and ...

    Read More: UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)
    Logo copy 3-1

    Fortified Security. Intelligent Innovation.

    +1 (702) 766-6257
    P.O. Box 750111
    Las Vegas, Nevada 89136

    Follow Us

    About

    • About Us
    • Contact
    • FAQ's

    Solutions

    • Products
    • AI Advisory
    • AI Assessment
    • Offensive Security
    • Defensive Security
    • Adversarial Operations
    • Social Engineering

    Resources

    • Blog
    • In The Media
    • Podcasts
    © 2026 All rights reserved.
    • Privacy Policy
    • Terms & Conditions