f33d by Preludef33d by Prelude
  • About
  • Archive
  • Help
  • Log in
ArchiveTopDiscussionAbout
"The Office"If an adversary focused on the fictional Dunder Mifflin office, how could they approach an offensive cyber operation?
David Hunt
Apr 15Comment 3Share

Share

How to hackLearn basic offensive security skills to protect your organization
David Hunt
Apr 12CommentShare

Share

Catch me if you canHow to build a disposable attack box using a Raspberry Pi
David Hunt
Apr 5CommentShare

Share

Protect yo' selfOperator's new Protect Mode introduces a hands-off approach to security testing
David Hunt
Mar 28CommentShare

Share

What's YOUR supply chain?Take a look behind the curtain at the Prelude Operator software dependencies
David Hunt
Mar 18CommentShare

Share

Your first ATT&CK procedurePart two in converting an idea into a repeatable attack
David Hunt
Mar 1CommentShare

Share

(Virtually) headlessDeploy Operator on remote servers and have the GUI "pop" on your desktop
David Hunt
Feb 20CommentShare

Share

Ready, set... hike!The power of converting an adversary emulation playbook into a full-fledged security assessment
David Hunt
Feb 8CommentShare

Share

Ask us anythingCommon questions about Prelude Operator.. answered!
David Hunt
Feb 7CommentShare

Share

The rise of automationHow autonomy is plotting to upend the offensive security space
David Hunt
Feb 6 2Comment 15Share

Share

The cybersecurity education problemAnd how Prelude plans to solve it
David Hunt
Feb 5 1CommentShare

Share

A history lessonFrom Caldera to Operator and the milestones in between
David Hunt
Jan 27CommentShare

Share

© 2021 Prelude Research Inc.. See privacy, terms and information collection notice
Publish on Substack