f33d by Prelude
Subscribe
About
Archive
Help
Log in
Archive
Top
Discussion
About
"The Office"
If an adversary focused on the fictional Dunder Mifflin office, how could they approach an offensive cyber operation?
David Hunt
Apr 15
Comment
3
Share
Share
How to hack
Learn basic offensive security skills to protect your organization
David Hunt
Apr 12
Comment
Share
Share
Catch me if you can
How to build a disposable attack box using a Raspberry Pi
David Hunt
Apr 5
Comment
Share
Share
Protect yo' self
Operator's new Protect Mode introduces a hands-off approach to security testing
David Hunt
Mar 28
Comment
Share
Share
What's YOUR supply chain?
Take a look behind the curtain at the Prelude Operator software dependencies
David Hunt
Mar 18
Comment
Share
Share
Your first ATT&CK procedure
Part two in converting an idea into a repeatable attack
David Hunt
Mar 1
Comment
Share
Share
(Virtually) headless
Deploy Operator on remote servers and have the GUI "pop" on your desktop
David Hunt
Feb 20
Comment
Share
Share
Ready, set... hike!
The power of converting an adversary emulation playbook into a full-fledged security assessment
David Hunt
Feb 8
Comment
Share
Share
Ask us anything
Common questions about Prelude Operator.. answered!
David Hunt
Feb 7
Comment
Share
Share
The rise of automation
How autonomy is plotting to upend the offensive security space
David Hunt
Feb 6
2
Comment
15
Share
Share
The cybersecurity education problem
And how Prelude plans to solve it
David Hunt
Feb 5
1
Comment
Share
Share
A history lesson
From Caldera to Operator and the milestones in between
David Hunt
Jan 27
Comment
Share
Share
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts