Consultancy and Training from a trusted supplier. Red Team and Adversary Simulation by ActiveBreach team.

Joined July 2011
Breaking the Browser: a tale of IPC, credentials and backdoors... new research and tools by @_batsec_ on how to tap chrome mdsec.co.uk/2021/01/breaking…
9
116
208
In our final blog post of 2020, @modexpblog catalogues a variety of methods for bypassing user-mode hooks for red teams mdsec.co.uk/2020/12/bypassin… We'll be back in 2021.... #happynewyear
7
103
176
GIF
While we've still got one more to follow (and plenty lined up for 2021), which was your favourite?
2
1
8
GIF
Replying to @netbiosX
0
0
2
GIF
Hacky Christmas from all the team at @MDSecLabs
0
7
41
Merry Christmas 🧀🍷🍺
After spoiling us with a Nintendo Switch in the beginning of the lockdown, now we’ve got this. Thanks @MDSecLabs 😎
0
0
17
Know your CSRF from your SSRF? We have some open positions in our pentest team for appsec specialists, come join us... mdsec.co.uk/careers/
2
11
38
GIF
We’re very happy to announce dates for our next public Adversary Simulation and Red Team Tactics Training are now available... eventbrite.com/e/adversary-s…
1
26
90
A Fresh Outlook on Mail Based Persistence - a new blog post by @domchell mdsec.co.uk/2020/11/a-fresh-… #redteam
4
86
199