I am an offensive engineer and red teamer who works for SpecterOps and formerly worked for Veris Group’s Adaptive Threat Division. I am a co-founder and active developer of:
- Empire/EmPyre – a pure PowerShell/Python post-exploitation agent (Slack channel invite here)
- BloodHound – an graph-based Active Directory analysis tool (Slack channel invite here)
- GhostPack
- PowerView and PowerUp
- Veil-Framework – an AV-evasion framework
I’m also an active PowerSploit developer and a Microsoft PowerShell/CDM MVP.
I’ve presented at ShmooCon, BlackHat, DEF CON, DerbyCon, CarolinaCon, Troopers, BlueHat Israel, and several Security BSides conferences on topics spanning AV-evasion, Active Directory, post-exploitation, red team tradecraft, BloodHound, and offensive PowerShell. I also formerly co-developed and taught the “Adaptive Red Team Tactics” and “Advanced PowerShell for Offensive Operations” Black Hat training classes, and currently develop the “Adversary Tactics: Active Directory” and “Adversary Tactics: Red Team Operations” training courses.
Links to all of my active projects are here and the slides/videos associated with any of my presentations are located here.
Twitter: @harmj0y
Github: https://github.com/harmj0y
Keybase.io: https://keybase.io/harmj0y
E-Mail: will [at] harmj0y [dot] net
harmj0y on freenode, #psempire and #armitage
Previously known as:
Twitter: @the_grayhound
Github: https://github.com/thegrayhound
Be First to Comment