Azure Privilege Escalation via Azure API Permissions Abuse Past
Free IPA – Attacking The Active Directory Of Linux
How Not to Shoot yourself in the Foot with Patterns
Walking the Bifrost: An Operator’s Guide to Heimdal & Kerberos on macOS
Understanding Windows Access Token Manipulation
Waking up the data engineer in you!
Practical Heuristic Exploitation
How do I detect technique X in Windows? Applied Methodology to Definitively Answer this Question