Just released: CyberCX 2026 Threat Report → 

Security Testing and Assurance

Industry contributions

 

CyberCX’s Security testing and Assurance team are dedicated to leading the global market in innovative security testing and assurance, while nurturing the industry’s most skilled consultants to secure our communities.

Security Testing and Assurance – Industry Contributions
decor
decor
decor

Events

    • November 2025
      • Dr Joel Panther | ISACA Canberra 2025
        Bytes Against Oppression: Digitally Resisting Authoritarian Regimes
      • Dr Joel Panther | AI & Crime Symposium, hosted by Griffith University’s Criminology Institute
        AI and Crime Prevention
      • Ethan McKee-Harris | Kawaiicon
        Breaking into Cyber Security
      • Ian Peters | Aotea Security
        Tightly Linked: The Intersection of Cyber and Physical Security
      • Liam O’Shannessy | ABC’s prime-time TV series Crime Night!
      • Liam O’Shannessy | Gallagher Security industry event
        Cyber security in Australia and NZ through the lens of 2,500 penetration tests
      • James Bannan | DDD Adelaide
        From Head Tattoos to Malware: A History of Steganography
    • September 2025
      • James Bannan |  CloudCon Sydney
        The Great Internet Mersenne Prime Search: 30 Years of Citizen Science
      • James Bannan | University of Melbourne as part of the Faculty of Arts Professional Series
        AI and Cyber Security
    • August 2025
      • Dr Joel Panther | DEFCON 33 DCGVR Community
        Do not obey in advance – Cybersecurity in the Fight Against Techno-Authoritarianism
      • Daniel Ting | DEFCON 33 DCGVR Community
        Better AppSec through better DevEx
      • Liam O’Shannessy | TasICT Cyber Conference
        Cyber security in Australia and NZ through the lens of 2,500 penetration tests
    • July 2025
      • James Bannan | BSides Brisbane
        From Head Tattoos to Malware: A History of Steganography
      • Dr Joel Panther | BSides Brisbane
        Do not obey in advance – Cybersecurity in the Fight Against Techno-Authoritarianism
      • Johannes Van Der Merwe | BSides Brisbane
        Planning a pentest: A Data-Driven Approach
      • Daniel Ting | BSides Brisbane
        Better AppSec through better DevEx
    • June 2025
      • Liam O’Shannessy | Man in the Middle Podcast
        STA Hack Report
      • Sean Titmarsh | Australian Podiatry Association Conference
        An adversary’s perspective of Allied Health: How cybersecurity failures lead to compromise
    • May 2025
      • Liam O’Shannessy | Techpartner News industry event
        STA Hack Report
      • Raafey Khan | Okta conference in Melbourne
        Bridging the Gap: Cyber Security, IDAM, and the Evolving Threat Landscape
      • Jason Edelstein | Okta conference in Sydney
        Bridging the Gap: Cyber Security, IDAM, and the Evolving Threat Landscape
      • James Bannan | BSides Adelaide
        Building E8 & ISM-Compliant Master Images
      • James Bannan | Webinar
        Microsoft Security for ISV Series: Enhanced Threat Detection & Monitoring AI Solutions
    • March 2025
      • James Bannan | AISA CyberCon Canberra
        Building E8 & ISM-Compliant Master Images
    • November 2024
      • KS Lam | AISA Melbourne
        How safe is safe? Exploiting the vitality of physical security in an ever-evolving world and its parallels to cyber security.
      • Carter Smith | AISA Melbourne
        What you don’t know can hurt you
      • Jorel Paddick | Guest Lecturer at Curtin University
        Behind the Firewall
      • DR Joel Panther | BSides Gold Coast
        Stop spying on me!’ Blocking adversarial DNS requests
      • Jacob Larsen | BSides Melbourne
        Crabby’s Credential Stuffing: How the new wave of Australian fraudsters are targeting you

James Bannan | BSides Brisbane

James Bannan | BSides Brisbane

 

Daniel Ting | BSides Brisbane

Daniel Ting | BSides Brisbane

 

Fadzayi Moyo - Australian Cyber Con

Fadzayi Moyo – Australian Cyber Con

 

Carter Smith - AISA Melbourne

Carter Smith – AISA Melbourne

 

KS Lam - AISA Melbourne

KS Lam – AISA Melbourne

 

Hunted TV Series - Season 3

Hunted TV Series – Season 3

 

60 Minutes: Scamdemic

60 Minutes: Scamdemic

decor

Training

James Bannan

Published the Pluralsight course “Azure Infrastructure-as-Code with ARM and Bicep

Mentored a team from Edith Cowan University (ECU) on their industry STEM project, via Practera

Jorel Paddick

Facilitating a year-long Capstone Project, focused on programming and cyber security with students from Curtin University.

James Bannan

Mentored a team from the University of South Australia on their industry STEM project, via Practera

Shofe Miraz

Organisation and coordination for Hack and Learn monthly InfoSec meetup

David Sowerbutts, KS Lam, Liam O’Brien, Fletcher Creed

Facilitated the Lockpicking Village at CrikeyCon

decor
decor

Network and Infrastructure Solutions icon

Tools

 

PurpleOps

An open-source self-hosted purple team management web application.

Efflanrs

Turn your Snaffler output into a nice searchable and sortable interface.

Email Spoof Check  

Audit your domain’s SPF and DMARC configuration.

Peep 

A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.

Pipe Client Impersonation Server

Creates a malicious named pipe server that impersonates connecting clients and executes arbitrary commands under their security context.

Jailbreak/Root Detection Bypass in Flutter

Frida script designed to bypass security checks that are implemented using the IOSSecuritySuite module in iOS applications and Rootbear in Android Applications.

Virtual Wireless Lab

A series of different lab exercies with the aim to teach the fundamentals around pentesting of 802.11 networks.

Conditional Match and Replace 

A Burp extension allowing you to create match and replace operations that execute only when a condition is matched.

NSEC(3) Walker

Automates extracting DNS zones akin to an AXFR zone transfer or a “zone dump”.

cta icon

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.