An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
An ACE Up The Sleeve: Designing Active Directory DACL Backdoors
An ACE Up The Sleeve – Designing Active Directory DACL Backdoors
Doomsday Preppers: Fortifying Your Red Team Infrastructure
Catch Me If You Can: PowerShell Red vs. Blue
BloodHound 1.3 – The ACL Attack Paths Update
Porting Binary PowerShell Modules to Linux/OSX