Cyber Security Awareness Month 2025

Security Testing and Assurance

Industry contributions

 

CyberCX’s Security testing and Assurance team are dedicated to leading the global market in innovative security testing and assurance, while nurturing the industry’s most skilled consultants to secure our communities.

a man fixing a CPU
decor
decor
decor

Events

  • September 2025
    • James Bannan |  CloudCon Sydney
      The Great Internet Mersenne Prime Search: 30 Years of Citizen Science
    • James Bannan | University of Melbourne as part of the Faculty of Arts Professional Series
      AI and Cyber Security
  • August 2025
    • Dr Joel Panther | DEFCON 33 DCGVR Community
      Do not obey in advance – Cybersecurity in the Fight Against Techno-Authoritarianism
    • Daniel Ting | DEFCON 33 DCGVR Community
      Better AppSec through better DevEx
    • Liam O’Shannessy | TasICT Cyber Conference
      Cyber security in Australia and NZ through the lens of 2,500 penetration tests
  • July 2025
    • James Bannan | BSides Brisbane
      From Head Tattoos to Malware: A History of Steganography
    • Dr Joel Panther | BSides Brisbane
      Do not obey in advance – Cybersecurity in the Fight Against Techno-Authoritarianism
    • Johannes Van Der Merwe | BSides Brisbane
      Planning a pentest: A Data-Driven Approach
    • Daniel Ting | BSides Brisbane
      Better AppSec through better DevEx
  • June 2025
    • Liam O’Shannessy | Man in the Middle Podcast
      STA Hack Report
    • Sean Titmarsh | Australian Podiatry Association Conference
      An adversary’s perspective of Allied Health: How cybersecurity failures lead to compromise
  • May 2025
    • Liam O’Shannessy | Techpartner News industry event
      STA Hack Report
    • Raafey Khan | Okta conference in Melbourne
      Bridging the Gap: Cyber Security, IDAM, and the Evolving Threat Landscape
    • Jason Edelstein | Okta conference in Sydney
      Bridging the Gap: Cyber Security, IDAM, and the Evolving Threat Landscape
    • James Bannan | BSides Adelaide
      Building E8 & ISM-Compliant Master Images
    • James Bannan | Webinar
      Microsoft Security for ISV Series: Enhanced Threat Detection & Monitoring AI Solutions
  • March 2025
    • James Bannan | AISA CyberCon Canberra
      Building E8 & ISM-Compliant Master Images
  • November 2024
    • KS Lam | AISA Melbourne
      How safe is safe? Exploiting the vitality of physical security in an ever-evolving world and its parallels to cyber security.
    • Carter Smith | AISA Melbourne
      What you don’t know can hurt you
    • Jorel Paddick | Guest Lecturer at Curtin University
      Behind the Firewall
    • DR Joel Panther | BSides Gold Coast
      Stop spying on me!’ Blocking adversarial DNS requests
    • Jacob Larsen | BSides Melbourne
      Crabby’s Credential Stuffing: How the new wave of Australian fraudsters are targeting you

James Bannan | BSides Brisbane

 

Daniel Ting | BSides Brisbane

 

Fadzayi Moyo – Australian Cyber Con

 

Carter Smith – AISA Melbourne

 

KS Lam – AISA Melbourne

 

Hunted TV Series – Season 3

 

60 Minutes: Scamdemic

decor

Training

James Bannan

Published the Pluralsight course “Azure Infrastructure-as-Code with ARM and Bicep

Mentored a team from Edith Cowan University (ECU) on their industry STEM project, via Practera

Jorel Paddick

Facilitating a year-long Capstone Project, focused on programming and cyber security with students from Curtin University.

James Bannan

Mentored a team from the University of South Australia on their industry STEM project, via Practera

Shofe Miraz

Organisation and coordination for Hack and Learn monthly InfoSec meetup

David Sowerbutts, KS Lam, Liam O’Brien, Fletcher Creed

Facilitated the Lockpicking Village at CrikeyCon

decor
decor

Network and Infrastructure Solutions icon

Tools

PurpleOps

An open-source self-hosted purple team management web application.

Efflanrs

Turn your Snaffler output into a nice searchable and sortable interface.

Email Spoof Check  

Audit your domain’s SPF and DMARC configuration.

Peep 

A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.

Pipe Client Impersonation Server

Creates a malicious named pipe server that impersonates connecting clients and executes arbitrary commands under their security context.

Jailbreak/Root Detection Bypass in Flutter

Frida script designed to bypass security checks that are implemented using the IOSSecuritySuite module in iOS applications and Rootbear in Android Applications.

Virtual Wireless Lab

A series of different lab exercies with the aim to teach the fundamentals around pentesting of 802.11 networks.

Conditional Match and Replace 

A Burp extension allowing you to create match and replace operations that execute only when a condition is matched.

NSEC(3) Walker

Automates extracting DNS zones akin to an AXFR zone transfer or a “zone dump”.

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.