Threat Intelligence logo

Our Black Hat Journey: Over A Decade of Learning, Sharing, and Growing

Threat Intelligence • July 26, 2024

We're thrilled to have been part of the Black Hat community since 2008! From our first presentation to running the longest-running training course at Black Hat USA, "The Shellcode Lab", we've loved every minute of it.

Innovating and Pushing Boundaries

Our team's passion for security research and training has led to some amazing experiences. We've delivered training sessions globally, including "Practical Threat Intelligence" and "Automating Security with Open Source". And, our experts have shared their expertise through presentations and webcasts like "Reverse DNS Tunneling Shellcode" and "Intelligent Security Automation".

The Shellcode Lab: Where Students Become Masters

The Shellcode Lab is back for its 14th year at Black Hat USA! This renowned training course takes your penetration testing skills to the next level. With 17 hands-on labs and 150+ slides of technical content, you'll master:


  • Payload development for Linux, Mac, and Windows
  • Integrating payloads into public exploits and Metasploit

This course is our most popular course and for good reason! Here’s what our students had to say:


  • "Best course I've taken at Black Hat"
  • "Best class in my 17-year career"
  • "Well-organized and well-paced"

The training is closed off with a walkthrough of Kernel-Level shellcode to open the students eyes as to what else is possible if they take their skills to an advanced level. Although as you can see the training is not for the fainthearted, we hold the students’ hands the whole way along to ensure they enjoy it and learn a huge amount in 2 days.

Automating Security with Open Source: A Total Game-Changer

Now in its seventh year, Automating Security with Open Source has received rave reviews and a 96% average score. We show students how to harness open-source tools to automate security ops, streamline their posture, and save costs.


You'll work in your own dedicated cloud-based Security Automation environment, complete with servers and applications containing security issues to detect and protect. Our goal is to teach you how to automate discovery and protection of security weaknesses, respond to incidents, and gain visibility into areas for further security automation enhancements.

The Black Hat Asia 2024 Review Board Game Show: Where Knowledge Meets Fun

We're excited to share our latest Black Hat adventure – hosting the Review Board Game Show at Black Hat Asia 2024! Our MD, Ty Miller, took the stage as the host, guiding three teams of Review Board Members through a battle of wits. The challenge? Testing their knowledge of the latest cybersecurity developments.

Contributing to the Black Hat Community

We're honored to have been invited to join the Black Hat Asia Review Board, where we help select presentations for Black Hat Asia each year. This gives us a unique insight into the latest security research from around the world and the AsiaPac region.

We've also had the privilege of moderating and participating in the Black Hat Asia Locknote Panel from 2020 to 2024, discussing our favorite presentations and sharing our expertise. And, in 2022, we were proud Gold Sponsors of Black Hat USA, launching our Evolve Security Automation Cloud globally.

Thank you to the Black Hat Team!

It has been an absolute pleasure working (and drinking) with the Black Hat team over the years – including one year where we wiped out half the Black Hat team during the conference with our over enthusiastic night time activities. We're grateful for the Black Hat team's support and collaboration over the years. They've been rockstars, delivering top-notch training and technical presentations even during tough times. They are, by far, still the #1 conference after all of these years for security training and top notch technical presentations. We are looking forward to working with Black Hat over the next decade!

Share

A group of people are sitting around a table with a check mark on it.
By Anupama Mukherjee February 20, 2025
Explore the world of cybersecurity preparedness through real-life tabletop exercise scenarios.
A black and white drawing of a group of people standing around a ballot box.
By Threat Intelligence February 13, 2025
In this blog post, we'll explore the legal ramifications of data breaches and provide best practices to help safeguard your business.
A red background with a lock in the middle of it.
By Threat Intelligence February 13, 2025
Master incident response with a foolproof plan. Learn the 4 phases & 5 steps to detect, contain, & recover from cyber threats. Protect your business now!
A man in a hood is standing in front of a computer screen.
By Threat Intelligence February 7, 2025
Actionable threat intelligence is distilled, contextual and real-time data about threats and threat actors that empowers security teams to identify, prioritise and mitigate security risks.

Related Content

Share by: