Outflank — Blog Catalogue

Outflank is a Dutch offensive-security firm (since 2017, acquired by Fortra in 2022) that publishes consistently high-signal research on Cobalt Strike tradecraft, Office maldoc tradecraft, EDR evasion, BOFs, kernel-mode tradecraft, and the C2 / RedELK ecosystem they ship as Outflank Security Tooling (OST). This page is the running index of every Outflank blog post — newest first, with the topic of each.

Status: drafting Related: Researchers, Reading List, OST, Outflank C2, RedELK


Why this page

Most of the things Outflank writes about are not one-shot disclosures — they’re durable tradecraft (HTML smuggling, External C2, AMSI for VBA, Excel 4 macros, Mark-of-the-Web bypasses, EDR unhooking) that have shaped red-team practice for years. The blog index goes back to 2017; entries thread into many of the tooling and technique pages elsewhere in this wiki.

Authors:

  • Marc Smeets — Outflank co-founder; RedELK; OST direction; year-end retros.
  • Pieter Ceelen — Office maldoc tradecraft; AMSI VBA; macro detection.
  • Stan Hegt — Office maldoc tradecraft (XLM, SYLK, Visual Studio); Cobalt Strike.
  • Cornelis de Plaa — direct syscalls, sRDI, AD recon via ADSI, advanced process monitoring.
  • Mark Bergman — Cobalt Strike External C2; DoH C2.
  • Cedric Van Bockhaven — secure enclaves (VBS), BOF linting, Superfetch internals, named-pipe enumeration, GrimResource (MSC).
  • Dima van de Wouw — Async BOFs, EDR unhooking, Early Cascade Injection, VSTO-signed phishing.
  • Kyle Avery — EDR internals (macOS / Linux), unmanaged .NET patching, LLM-assisted offensive R&D, macOS JIT, seccomp-notifier injection.
  • Mariusz Banach — Red Macros Factory (joined 2026).
  • Daniel Duggan (“RastaMouse”) — Zero-Point Security training (joined 2026 via Fortra).
  • Ksawery Czapczyński — kernel-mode tradecraft (PatchGuard Peekaboo).
  • Jarno — honeypots vs red teams.

Counts as of 2026-05-01: 53 posts, 14 Sep 2017 → 02 Apr 2026.


2026

DateAuthorTitleTopic
2026-04-02Daniel DugganNew Mouse in the House: Zero-Point Security Training Joins the Fortra FamilyRastaMouse / Zero-Point Security (CRTO) joins Fortra/Outflank for offensive-security training.
2026-03-26StanIntroducing Cobalt Strike Research LabsCobalt Strike Research Labs initiative within Fortra/Outflank.
2026-02-19Kyle AverymacOS JIT MemoryAbusing macOS JIT memory regions for offensive code execution. See macOS JIT shellcode.
2026-01-21Mariusz BanachRed Macros Factory Is Joining OST (And So Am I!)Mariusz Banach + his Red Macros Factory tooling join OST.
2026-01-07Ksawery CzapczyńskiPatchGuard Peekaboo: Hiding Processes on Systems with PatchGuard in 2026Hiding processes on PatchGuard-protected Windows kernels.

2025

DateAuthorTitleTopic
2025-12-09Kyle AveryLinux Process Injection via Seccomp NotifierLinux injection via the seccomp notifier mechanism. See Seccomp-notifier injection.
2025-08-07Kyle AveryTraining Specialist Models: Automating Malware DevelopmentTraining specialist LLMs for malware-dev automation.
2025-07-29Kyle AveryAccelerating Offensive R&D with Large Language ModelsLLMs for offensive R&D.
2025-07-16Dima van de WouwAsync BOFs – “Wake Me Up, Before You Go Go”Asynchronous Beacon Object Files for long-running tasks. See BOFs.
2025-06-30Cedric Van BockhavenBOF Linting for Accelerated DevelopmentBOF linter for development.
2025-06-16Cedric Van BockhavenSecure Enclaves for Offensive Operations (Part II)VBS / secure enclaves for offensive payloads. See Secure enclaves for offensive ops.
2025-02-03Cedric Van BockhavenSecure Enclaves for Offensive Operations (Part I)Introducing secure enclaves as offensive primitive.

2024

DateAuthorTitleTopic
2024-12-17Marc Smeets2024 Wrapped: Outflank’s Top Tracks2024 year-in-review of research and OST releases.
2024-10-15Dima van de WouwIntroducing Early Cascade InjectionStealthy injection via Windows process creation. See Early Cascade Injection.
2024-08-13Cedric Van BockhavenWill the real #GrimResource please stand up? – Abusing the MSC file formatMSC (Microsoft Saved Console) file abuse. See GrimResource (MSC).
2024-08-07Marc SmeetsIntroducing Outflank C2Outflank C2 with cross-platform implants. See Outflank C2.
2024-06-03Kyle AveryEDR Internals for macOS and LinuxHow EDR products instrument macOS / Linux.
2024-04-29Marc SmeetsOST Release Blog: EDR Tradecraft, Presets, PowerShell Tradecraft, and MoreOST release notes. See OST.
2024-02-01Kyle AveryUnmanaged .NET PatchingPatching the .NET runtime to bypass AMSI/ETW. See AMSI bypass.

2023

DateAuthorTitleTopic
2023-12-19Marc SmeetsFree Training: Microsoft Office Offensive Tradecraft for Red TeamersFree Office offensive tradecraft training.
2023-12-14Cedric Van BockhavenMapping Virtual to Physical Addresses Using SuperfetchVA → PA mapping via the Superfetch API.
2023-11-06Marc SmeetsReflecting on a Year with Fortra and Next Steps for OutflankYear-after-Fortra retrospective.
2023-10-19Cedric Van BockhavenListing remote named pipesRemote named-pipe enumeration.
2023-10-05Dima van de WouwSolving The “Unhooking” ProblemRobust EDR userland unhooking. See EDR unhooking.
2023-07-19Pieter CeelenCobalt Strike and Outflank Security Tooling: Friends in Evasive PlacesOST + Cobalt Strike integration.
2023-04-25Pieter CeelenSo you think you can block Macros?Bypassing Office macro blocking (MotW). See Mark-of-the-Web and Office macro tradecraft.
2023-03-28StanAttacking Visual Studio for Initial AccessVisual Studio project files for initial-access RCE.

2022

DateAuthorTitleTopic
2022-01-07Dima van de WouwA phishing document signed by Microsoft – part 2VSTO-signed maldoc, part 2. See VSTO-signed phishing.

2021

DateAuthorTitleTopic
2021-12-09Dima van de WouwA phishing document signed by Microsoft – part 1Weaponising Microsoft-signed VSTO add-ins for phishing.
2021-04-02Marc SmeetsOur reasoning for Outflank Security ToolingWhy OST exists.
2021-03-03JarnoCatching red teams with honeypots part 1: local reconHoneypots for detecting red-team local recon.

2020

DateAuthorTitleTopic
2020-12-26CornelisDirect Syscalls in Beacon Object FilesDirect syscalls inside Cobalt Strike BOFs.
2020-04-07Marc SmeetsRedELK Part 3 – Achieving operational oversightRedELK ops oversight + IOC detection. See RedELK.
2020-03-30StanMark-of-the-Web from a Red Team’s PerspectiveRed-team perspective on MotW.
2020-03-11CornelisRed Team Tactics: Advanced process monitoringPPL / Protected Processes for offensive ops.
2020-02-28Marc SmeetsRedELK Part 2 – getting you up and runningRedELK install + config.

2019

DateAuthorTitleTopic
2019-10-30StanAbusing the SYLK file formatSYLK weaponisation for Excel RCE. See Office macro tradecraft.
2019-10-20CornelisRed Team Tactics: AD Recon using ADSI and Reflective DLLsAD recon via ADSI APIs + reflective DLL.
2019-06-19CornelisRed Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDRDirect syscalls + sRDI.
2019-05-05StanEvil Clippy: MS Office maldoc assistantEvil Clippy maldoc tool. See Evil Clippy.
2019-04-17Pieter CeelenBypassing AMSI for VBAAMSI for VBA bypass. See AMSI bypass.
2019-04-02Pieter CeelenMS Word field abuseINCLUDEPICTURE etc. for phishing / RCE.
2019-02-14Marc SmeetsIntroducing RedELK – Part 1: why we need itRedELK motivation.

2018

DateAuthorTitleTopic
2018-10-28StanRecordings of our DerbyCon and BruCON presentationsTalk recordings.
2018-10-25Mark BergmanBuilding resilient C2 infrastructures using DoHDoH C2 resilience.
2018-10-12Pieter CeelenSylk + XLM = Code execution on Office 2011 for MacSYLK + XLM RCE on Mac Office.
2018-10-06StanOld school: evil Excel 4.0 macros (XLM)Reviving XLM macros as stealthy maldoc.
2018-08-14StanHTML smuggling explainedFoundational HTML-smuggling explainer. See HTML smuggling.
2018-03-30Marc SmeetsAutomated AD and Windows test lab deployments with Invoke-ADLabDeployerInvoke-ADLabDeployer test-lab automation.
2018-01-23Marc SmeetsPublic password dumps in ELKIndexing breach dumps in ELK.
2018-01-16Pieter CeelenHunting for evil: detect macros being executedDetection of macro execution (defender side).

2017

DateAuthorTitleTopic
2017-09-17Mark BergmanCobalt Strike over external C2External C2 for Cobalt Strike (Outlook tunnelling). See External C2.
2017-09-14Mark BergmanHarakiri – exploitation of a mail handlerMail-handler service exploitation (Harakiri).

How this thread into the wiki

Wiki pageOutflank posts that fed it
HTML smuggling2018-08-14 HTML smuggling explained.
Mark-of-the-Web2020-03-30, 2023-04-25.
Office macro tradecraft2018-10-06 (XLM), 2018-10-12 (SYLK + XLM Mac), 2019-04-02 (Word fields), 2019-04-17 (AMSI VBA), 2019-05-05 (Evil Clippy), 2019-10-30 (SYLK), 2023-04-25 (block-macros bypass).
VSTO-signed phishing2021-12-09, 2022-01-07.
GrimResource (MSC)2024-08-13.
External C22017-09-17.
Secure enclaves for offensive ops2025-02-03 (Pt I), 2025-06-16 (Pt II).
AMSI bypass2019-04-17 (AMSI VBA), 2024-02-01 (Unmanaged .NET patching).
EDR unhooking2019-06-19 (direct syscalls + sRDI), 2020-12-26 (direct syscalls in BOFs), 2023-10-05 (unhooking solved).
Early Cascade Injection2024-10-15.
Seccomp-notifier injection2025-12-09.
BOFs2020-12-26, 2025-06-30 (linting), 2025-07-16 (Async BOFs).
RedELK2019-02-14 (Pt 1), 2020-02-28 (Pt 2), 2020-04-07 (Pt 3).
Evil Clippy2019-05-05.
Outflank C22024-08-07.
OST (Outflank Security Tooling)2021-04-02, 2023-07-19, 2024-04-29, 2024-12-17.

See also