Walking the Bifrost: An Operator’s Guide to Heimdal & Kerberos on macOS
Understanding Windows Access Token Manipulation
Waking up the data engineer in you!
Practical Heuristic Exploitation
Not A Security Boundary: Breaking Forest Trusts
How do I detect technique X in Windows? Applied Methodology to Definitively Answer this Question
Finding Our Path: How We’re Trying to Improve Active Directory Security
Aug 08, 2019
Bash-ing Brittle Indicators: Red Teaming macOS without Bash or Python