- Executive Offense
- Posts
- 🔴 Executive Offense - Cons, Content, and Giveaways!
🔴 Executive Offense - Cons, Content, and Giveaways!
Slides + Tools + Content Share!

Hey everyone!
Thinking back on the last few quarters, it’s been a full sprint of airports, conference halls, workshops, trainings, and late-night debugging sessions. We’ve been all over the place running material for folks who actually want to get hands-on and break things, and that energy never gets old.
A bunch of you asked for the slides, and honestly, I hate when usable content disappears after a talk. So here’s a quick drop of the latest versions plus a few extras.
/ Attacking AI Talk

At conferences, we run a condensed 1-hour version of our full two-day Attacking AI course. It’s the highlight reel, but it has some of the most used techniques in there!
We revise this talk constantly. The AI security landscape shifts fast, and every workshop teaches us something new that’s worth folding back into the deck. What you’re getting here is the most current version: tightened, updated, and fresh from the last round of sessions.
Take a look, kick the tires, and let me know what you want expanded in the next round.
(Sponsor)
No More Babysitting the Security of Your Google Workspace
Material ends the babysitter routine in Google Workspace. While your employees communicate via email and access sensitive files, Material quietly contains what’s lying in wait: phishing attacks in Gmail, exposed Drive files, and suspicious account activity. Agentless and API-first, it stops attacks and triages user reports with AI while running safe, automatic fixes so you don’t have to hover. Search everything in seconds, stream alerts to your SIEM, and audit with detailed access logs. 24/7 autopilot security; no extra headcount, no constant hand-holding.
(Note from Jason: Google Workplace and other ecosystems attacks are a common pivot point in a modern threat actor's game plan. Before posting this sponsorship section, I reviewed some Material Blogs, some very cool research there! https://material.security/resources )
/ Modern Recon for Red Teamers and Pentesters Talk

As part of keeping the Bug Hunter's Methodology class sharp, we also put together a tight 1 hour refresh on modern reconnaissance tactics for red teamers and pentesters at Wild West Hackin Fest. It is a fast, focused run through of the recon approaches I rely on most in real engagements and it sets the stage for the deeper work.
This session is only one hour, so if you want the full experience, join us in December for the 4 hour workshop. That version lets us dig into the operator level details, the tradecraft, and the parts that never fit into a conference slot.
/ A Few Other Talks We Liked!
Over the cons we saw several other awesome practitioners present on AI and Traditional Hacking! Here are some we were able to get our hands on!
How to Learn Faster with AI by Jeff McJunkin - LINK
Common Web Vulnerabilities and Escalating Impact by Garrett Adler - LINK
(not the newest but pretty recent) Real World AI Risks And Mitigating Them by Jake Williams - LINK
/ Outro and Giveaway

If you missed out on the Arcanum Spellbook DEFCON Badge at hacker summer camp, fear not. We've placed a limited additional order and will be giving away a few items in this newsletter!
If you’re already subscribed to the newsletter, you’ll see the giveaway form below. If not, get subscribed and enter! You will need to both share the post on X or LinkedIn AND enter the form to be entered.
Other than that, we're really excited to bring you some future newsletter issues on modern pentest methodology and a really cool project we are cooking up to help new people get into the field!
Thanks for reading, Happy hacking!

