blog category
Blog

BloodHound
Introducing the BloodHound Query Library
TL;DR The BloodHound Query Library is a community-driven collection of Cypher queries designed to help BloodHound...
By: Martin Sohn Christensen, Joey Dreijer
Jun 17, 2025 • 6 min read
Read Post
BloodHound
Making Least Privilege Real: Previewing Privilege Zones in BloodHound Enterprise
TL;DR Most organizations assume they’ve implemented least privilege, but assumptions don’t stop attackers. Privilege Zones in...
By: Justin Kohler
Jun 16, 2025 • 8 min read
Read Post
Research & Tradecraft
OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys
TL;DR OneLogin was found to have security vulnerabilities in its AD Connector service that exposed authentication...
By: Julian Catrambone
Jun 10, 2025 • 11 min read
Read Post
Research & Tradecraft
Update: Dumping Entra Connect Sync Credentials
TL;DR Microsoft has recently changed how Entra Connect Sync authenticates to Entra ID. This blog post...
By: Daniel Heinsen
Jun 9, 2025 • 10 min read
Read Post
BloodHound
Chatting with Your Attack Paths: An MCP for BloodHound
TL;DR In an effort to learn about Model Context Protocol servers, I created a MCP server...
By: Matthew Nickerson
Jun 4, 2025 • 22 min read
Read Post
Research & Tradecraft
TL;DR Tokenization Confusion: We look at the new Prompt Guard 2 model from Meta, how “confusing”...
By: Adam Chester
Jun 3, 2025 • 20 min read
Read Post
Research & Tradecraft
Getting the Most Value Out of the OSCP: After the Exam
In the final post of this series, I’ll discuss what to do after your latest exam...
By: kieran croucher
Jun 2, 2025 • 20 min read
Read Post
Industry Insights
Getting the Most Value Out of the OSCP: After the Exam
TL;DR In the final post of this series, I’ll discuss what to do after your latest...
By: Kieran Croucher
Jun 2, 2025 • 20 min read
Read Post
Research & Tradecraft
TL;DR: This post shows how COM hijacking can serve as a reliable persistence method while also...