Skip to Main Content

Kevin Clark

Security Consultant

EXPERIENCE
Kevin Clark is a member of the Targeted Operations team and has over five years of experience in penetration testing and offensive security roles. He has performed Red Team and penetration tests for large and small companies alike. Before TrustedSec, Kevin was a software developer focused on creating offensive security tools.

EDUCATION & CERTIFICATIONS

  • Certified Red Team Operator (CRTO)
  • Certified Red Team Lead (CRTL)
  • Offensive Security Certified Professional (OSCP)
  • Red Hat Certified System Administrator (RHCSA)

PROFESSIONAL AFFILIATIONS
Kevin is a contributor open-source security tools such as Metasploit and PowerShell Empire. He is also a training instructor at industry recognized conferences such as Black Hat and DefCon.

INDUSTRY CONTRIBUTIONS
Kevin maintains Ek47, an environmental keying payload encryptor for usage on Red Team engagements. He also maintains Badrats, a custom Command and Control (C2) tool designed for initial access.

PASSION FOR SECURITY
Kevin loves to share his skills and knowledge in the information security community. Outside of work, he is an adjunct teacher at Century College in White Bear Lake, Minnesota. He also hosts and writes blog posts about security-related topics at https://henpeebin.com/kevin/blog

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog January 24 2023

Operator's Guide to the Meterpreter BOFLoader

1.1      Introduction Recently, myself and a few friends decided to port my coworker Kevin Haubris' COFFLoader project to Metasploit. This new BOFLoader…

Read about this article
Blog January 06 2018

Welcome to 2018! A Meltdown and Spectre Run-Through

Welcome to 2018! It’s only been a few days into the new year and we already have newly named bugs, thanks to the Google Project Zero, Cyberus Technology, and…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Podcasts December 06 2024

Security Noise - Episode 7.7

Amazing Stories in InfoSec

Read about this article
Blog December 05 2024

On-Demand BOF

From the team that brought you COFF Loader, CS-Situational-Awareness-BOF, CS-Remote-OPs-BOF, and numerous blogs on BOFs, we are excited to release our first…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Join Senior Security Consultant Steven Erwin and Security Consultant Caroline Fenstermacher as they cover the basics of BEC analysis, providing participants…

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Like most red teamers, I spend quite a lot of time looking for novel vulnerabilities that could be used for initial access or lateral movement. Recently, my…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article
Events TrustedSec HQ | November 20 2024

WiCyS Ransomware Panel & Networking Event

Join us for an insightful discussion with the Women in Cyber Security (WiCyS) Northeast Ohio Affiliate members!

Read about this article
Webinars November 20 2024

Navigating Compliance: FCI and CUI Requirements for Federal Contractors

TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.