Webcast – Cyber Deception in AC-Hunter

MITRE ATT&CK Matrix – Custom C2 Protocol

MITRE ATT&CK Matrix – C2 Connection Proxy

Bypassing Beaconing Detection with Metasploit

Detecting Compromises With AI-Hunter

Portspoof