A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image ScareCrow Payload Creation Framework February 03, 2021 ScareCrow is a payload creation framework for generating loaders that side-load (not inject) into a legitimate Windows process (bypassing Application... See Details Tool Image Attacking the JNI Boundary with Frida September 11, 2020 Moving functionality from Java to native implementations in Android increases obscurity but not security. See Details Tool Image Universal BLE Monitoring with Frida (or Objection) August 24, 2020 The standalone script can be used directly with Frida in order to monitor basic BLE traffic between a mobile device (central) and a BLE peripheral. See Details Tool Image Digging Your Talons In – New Take On Password Guessing June 19, 2020 Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment. See Details Tool Image Visual Lock Picking Workstation June 11, 2020 The Visual Lock Picking Workstation is a Raspberry Pi enclosure which makes it possible to capture live video from a cutaway lock. See Details Tool Image Azure API Management Tracing Helper June 11, 2020 Azure API Management Tracing Helper is a Burp Suite extension to aid in testing APIs hosted on the Azure API Management platform. See Details Tool Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image ScareCrow Payload Creation Framework February 03, 2021 ScareCrow is a payload creation framework for generating loaders that side-load (not inject) into a legitimate Windows process (bypassing Application... See Details Tool
Image Attacking the JNI Boundary with Frida September 11, 2020 Moving functionality from Java to native implementations in Android increases obscurity but not security. See Details Tool
Image Universal BLE Monitoring with Frida (or Objection) August 24, 2020 The standalone script can be used directly with Frida in order to monitor basic BLE traffic between a mobile device (central) and a BLE peripheral. See Details Tool
Image Digging Your Talons In – New Take On Password Guessing June 19, 2020 Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment. See Details Tool
Image Visual Lock Picking Workstation June 11, 2020 The Visual Lock Picking Workstation is a Raspberry Pi enclosure which makes it possible to capture live video from a cutaway lock. See Details Tool
Image Azure API Management Tracing Helper June 11, 2020 Azure API Management Tracing Helper is a Burp Suite extension to aid in testing APIs hosted on the Azure API Management platform. See Details Tool