The course objective is to provide an overview of technologies and techniques used to implement security tools from an attacker's point of view and provide a better understanding of tool implementation from a defensive and forensic analysis stance as well as for security auditors/red team personnel.