Black Hat Europe 2019 – Dark Side Ops 1: Malware Dev Training  – London, United Kingdom – December 2-3, 2019

We are a



It may feel like it, but you’re not defending against auditors. You’re defending against intelligent, persistent cyber adversaries that know how to covertly bypass the latest in defensive technologies. You need a partner that can simulate that level of sophistication to help you better defend against real-world threats.

The Silent Break Difference

Silent Break Security sets the bar for quality, customer service, and professionalism. From compliance to sophisticated adversary simulations to collaborative assessments to custom red team tool-kits and training, we customize our approach to best help organizations improve their security maturity. Don't take our word for it, just ask our customers.


Learn More


Learn More


Learn More


Learn More


Learn More
ExploitsRed TeamReversing
October 9, 2019

CVE-2019-10617 – AtherosSvc Registry LPE

Discovery In DbgView one day, I noticed repeated noisy output from a particular process. The pestering output bothered me enough to do some investigating. The offender was C:\Windows\System32\Drivers\AdminService.exe, the binary…
July 30, 2019

Black Hat and BSidesLV 2019

With Black Hat quickly approaching, we wanted to announce our plans for the week, and where you can find us. We'll be providing training, speaking, running a booth, and handing…
InfrastructurePenetration TestingRed Team
June 13, 2019

Modern Red Team Infrastructure

There’s been a lot of talk recently regarding modern strategies for red team infrastructure. The implementations vary greatly, but hopefully, we can provide some insight into how Silent Break, in…
CodeRed Team
June 4, 2019

Re-Animating ActivitySurrogateSelector

In 2017, James Forshaw released a DotNet deserialization gadget which abuses the ActivitySurrogateSelector class from System.Workflow.ComponentModel. As detailed in his post, this gadget is particularly useful, providing cross-version support and…