Charles F. Hamilton (Mr.Un1k0d3r)

Back to the list of Speakers and Sessions

Charles F. Hamilton (Mr.Un1k0d3r) ,

Charles Hamilton is a Red Teamer with over ten years of experience delivering offensive testing services for various government clients and commercial sectors. In recent years, Charles has specialized in covert Red Team operations targeting complex and highly secured environments. These operations have enabled him to refine his skills in stealthily navigating client networks without detection.

Since 2014, he has been the founder and operator of the RingZer0 Team website, a platform dedicated to teaching hacking fundamentals. The RingZer0 community currently boasts over 50,000 members worldwide. Charles is also a prolific toolsmith and trainer who has delivered this training more than 20 times, both online and onsite. He is a speaker in the InfoSec industry, known under the handle Mr.Un1k0d3r.


Training: Red Team

Discussion: Red Team Q&A

This is a Q&A session. Moderators will take audience questions both remotely and on-site via sli.do.


Q&A Discussion for the red team block.

Talk: Browser is the new LSASS

Talks will be streamed on YouTube and Twitch for free.


In a world where MFA is enabled on every portal and everything is a web application, red teamers can access cookies and cached information from your browser to gain access to everything without knowing a simple password or having access to your MFA.

Training: Red Team Training

The training is divided into five sections: Initial Foothold, Gaining Access, Offensive Coding, Internal Reconnaissance, and Lateral Movement. Each section will be covered in depth, providing technical evidence of how each technique works. Red team exercises will be performed to assess responsiveness and detection capabilities. As a red teamer, it is important to understand what each tool and command you use is doing behind the scenes to provide proper guidance. The training will help you understand the tools and techniques used during a red team exercise, develop your own toolset, adapt existing tools when needed, identify new techniques or potential evasion tricks, and gain an overview of the popular methods used in red team exercises.

Expect to perform code reviews, network analysis, code behavior analysis, and write code to enhance your red team capabilities.