TOMORROW: Join us for a demo of OST and find out how we to address the need for stealthy and operationally secure red teaming tools that cover the full attack chain.
Register now: https://ow.ly/onYi50YrSH7
TOMORROW: Join us for a demo of OST and find out how we to address the need for stealthy and operationally secure red teaming tools that cover the full attack chain.
Register now: https://ow.ly/onYi50YrSH7
Spring fever has us dreaming of cutoff hoodies in the sun. For now, we're happy to roll up our sleeves and show off our evasive #redteam toolset. Join us March 11:
https://register.gotowebinar.com/register/2820553442653590103?source=bsky
Curlers and #redteams are a lot alike: Examine your environment, then sweep with purpose to hit your target. 🥌 But unlike curling, stealth ops lose points if we start yelling. On March 7, see how OST tooling can quietly sweep through systems and reveal attack paths.
https://ow.ly/2S9650YmCn5
The macOS Hardened Runtime isn’t a dead end for in-memory execution. In his latest post, Kyle Avery looks at the 'allow-jit' entitlement and demonstrates shellcode execution in apps that have it.
https://www.outflank.nl/blog/2026/02/19/macos-jit-memory/
Headed to HackCon? Be sure to catch Cedric Van Bockhaven's speaking session, where you'll learn to execute code without relying on traditional executable files by leveraging file formats and interpreters less likely to trigger security alarms.
Get more details:
https://ow.ly/GKxC50Y9P0o
Starting soon! Get a walkthrough of our #redteam toolkit and learn about:
- Bypassing EDRs
- OPSEC-safe payload generation
- Evasive lateral movements
- How to wear a red hoodie
https://register.gotowebinar.com/register/8089587983404078682?source=BSky
Join us on Feb. 4th for a demo of OST! Get a walkthrough of our #redteam toolkit and learn about:
- Bypassing EDRs
- OPSEC-safe payload generation
- Evasive lateral movements
- What animal makes the best red (is it this kitten?)
https://ow.ly/bEjJ50Y1k2i
📢 Big News! @mgeeky.bsky.social is joining Outflank! He ticks all the boxes:
Experienced #offsec researcher ✓
Respected name in red teaming ✓
Built RMF tooling for initial access ✓
His work is coming to OST✓
The red hoodie fits perfectly ✓
Welcome Mariusz!
https://ow.ly/epnS50Y0IV0
Let's play peekaboo with PatchGuard! Read our blog post about hiding processes on modern Windows systems with HVCI enabled:
https://www.outflank.nl/blog/2026/01/07/patchguard-peekaboo-hiding-processes-on-systems-with-patchguard-in-2026/
Rudolph’s red nose may light the way, but his red teaming skills keep Santa’s sleigh mission-ready by simulating full-scale attacks to ensure everything runs flawlessly on delivery night. See how OST can protect your sleigh/systems at our demo on January 7th:
https://ow.ly/nV8C50XNxNe
Elf on the Shelf? More like Elf keeping it Stealth! Join our upcoming demo on December 15 to explore the expertly tinkered creations of the Outflank workshop: An advanced evasive toolset crafted to emulate real-world attack scenarios.
Register now: https://ow.ly/tqm850XIr6r
With Outflank Security Tooling, red teamers can make sure attackers are left out in the cold. Join our #offsec experts for an upcoming demo on December 15 to see how our toolset covers every step in the attacker kill chain.
Register now: https://ow.ly/RrRr50XGZ4Y
New blog by Outflank’s Kyle Avery: Linux process injection leveraging seccomp to inject shared libraries into Linux processes without LD_PRELOAD, ptrace nor elevated privileges.
Parent-to-child injection at any ptrace_scope level 💪😎
Tech details here: https://ow.ly/frq350XGvfQ
Spooky Season calls for supreme stealth. 🎃 Register now for our upcoming demo to learn how OST allows you to be a ghost in the machine for truly haunting #redteam engagements. 👻
https://ow.ly/zP9U50Xk2Hf
OST Release #20 shipped! Highlights of 2025 so far:
Hiding malware in secure enclaves
new file formats for code exec, lateral and persistence
Chromeo: Post-exploit tooling for Chromium
Async BOFs & BOF-PE support
Besides those, Lots of evasion and tradecraft additions… And much more to come!
Last chance to register for a free training on #AI in #OffSec engagements! Join Cobalt Strike and Outflank experts TOMORROW to gain practical experience to architect AI-powered attack chains and navigate AI assisted adversary simulation.
https://ow.ly/ySlC50Xf2Yl
ANNACON is next week! Bent u er klaar voor? Be sure to stop by our booth to grab some swag and talk all things #OffSec!
Want to integrate #LLMs and #AI into #OffSec operations? On Oct 21, experts from Outflank and Cobalt Strike are offering a free hands-on training sharing their research on using these technologies to amplify engagements. Spots are limited, register now!
https://ow.ly/G0YO50XaQW0
Go beyond superficial usage of #LLMs and #AI in this free training from Cobalt Strike and Outflank experts. Gain practical experience to architect AI-powered attack chains and navigate AI assisted adversary simulation. Register now!
https://ow.ly/zOON50X733h
Ready to tip our hats at Wild West Hackin' Fest! Be sure to stop by the Fortra booth to talk about recent updates to our OST toolset , discuss our latest research, and ask any #offsec questions! #WWHF