This course is for practitioners who want to emulate adversaries without malware, without traditional C2 infrastructure, and without unnecessary footprint.| ZephrSec - Adventures In Information Security
When I originally posted the blog post that lived on this page a lot of CTI professionals got sad and had a go at me. My view of Offensive CTI is using TA knowledge to better improve red team and offensive security for defence. There is also an element of| ZephrSec - Adventures In Information Security