Kyle Avery’s primary focus is to conduct covert operations in Active Directory environments, specifically with .NET tradecraft. He supports operations at BHIS by automating the obfuscation of commodity and custom tooling. In addition to this work, Kyle authors and teaches the Windows Post-Exploitation course at Wild West Hackin’ Fest. He formally studied system administration and compliance at university but spent his free time learning offensive security techniques. Kyle’s hobbies include Hack The Box, homelabbing, and catching the latest drama on infosec Twitter.