Offensive Security Project
Join our offensive development courses and modules, and explore the techniques database with 70+ real techniques. Learn to create, analyze, and bypass detection systems with lessons that take your skills to the next level
01.
Courses
Video-based courses focused on offensive development from beginner to advanced, covering creation, evasion, and analysis to give you a full understanding of real-world red team operations
02.
Modules
Text-based modules on cybersecurity, mainly Windows offensive development with some blue team content. Each takes 30โ60 minutes to read, with a new release every 15 days
03.
Technique Database
An expanding library of 80+ real offensive dev techniques, with a new one added weekly. Each includes explanations, code, PoC videos, and AV detection reports

Learn it. Build it. Own it.
Courses
Master offensive security development with comprehensive courses covering Windows offensive development, RAT building, malware analysis, and C++ programming.
Learn more โModules
Learn advanced offensive techniques for Windows OS with new content every 15 days. Each module offers 45+ minutes of reading time, from beginner to advanced levels in C++.
Learn more โTechnique Database
Access an ever-growing collection of real-world offensive development techniques. New techniques added weekly to keep you updated with the latest threats and research insights.
Learn more โBuilt for teams. Proven in the field.
Custom Agents
Command and Control (C2) agents compatible with Mythic, Havoc and other open source C2 Servers.
Delivered under 48h, reliable, and competitively priced for companies and pentesters.
Consulting Services
Professional consulting services for offensive security, malware research, and security assessments. Custom solutions tailored to your organization’s needs.
Learn more โPentesting Services
Comprehensive penetration testing to identify vulnerabilities and improve your security posture. Specialized in real-world, threat-led scenarios for organizations and pentesters.
Learn more โ01
Windows OS
The artifacts produced across all products are currently primarily focused on targeting Windows systems.
02
Programming Languages
The code showcased in our courses and modules is primarily written in C++, while the technique database has begun incorporating Rust implementations to the C++ ones.
03
Red Team
This project is focused on Red Team and Offensive Security operations, and everyone interested is welcome to join.
All content and code provided by 0x12 Dark Development is intended solely for educational and ethical cybersecurity purposes.
We do not take responsibility for any misuse of the code, techniques, or information shared.
Users are fully responsible for ensuring compliance with laws and regulations.
Any unauthorized or malicious application of this material is against our terms and is the sole responsibility of the individual.
Our goal is to support cybersecurity through ethical education knowledge.