$ ./list_conferences.sh

Conference Appearances

Sharing knowledge and connecting with the security community through presentations and booth appearances.

Speaker Presentations

Our team shares cutting-edge research and practical techniques at security conferences worldwide.

2024
Hack the Hash
GrrCon 2024 - Grand Rapids, MI
GrrCon 2024

A comprehensive talk exploring hash cracking tactics learned over the years, covering hashcat basics, advanced techniques, and real-world strategies for password analysis.

Key Topics:

  • Hashcat fundamentals and optimization
  • Advanced cracking techniques and wordlist strategies
  • Rule-based attacks and mask attacks
  • Real-world password patterns and analysis
2025
Crack. Track. React.
GrrCon 2025 - Grand Rapids, MI
GrrCon 2025

An in-depth presentation on the Bounty tool and our autonomous hash cracking system designed specifically for Active Directory environments, demonstrating how organizations can proactively identify and remediate weak passwords.

Key Topics:

  • Autonomous hash cracking architecture
  • Active Directory integration and security
  • Real-time password vulnerability detection
  • Enterprise password hardening strategies

Security Training

Hands-on, immersive training courses designed to build real-world offensive security skills.

2026
Offensive Active Directory Operations Certification (OADOC)
NorthSec 2026 - Montreal, QC
NorthSec 2026

A beginner-to-advanced, hands-on course designed for cybersecurity professionals who want to build and refine their skills in modern Active Directory exploitation. This immersive program places students inside realistic enterprise environments with progressively challenging attack scenarios.

Key Topics:

  • Windows and Linux attack paths
  • Active Directory infrastructure exploitation
  • Latest forest functional levels
  • Real adversary tactics and techniques

Booth Appearances

Visit us at our booth to learn more about our tools, services, and security solutions.

Check back soon for upcoming booth appearances!

$ ./contact_us.sh

Ready to Unleash the Kraken?

Contact us to discuss your offensive security needs and how our tools and expertise can enhance your security posture.