An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
Here Be Dragons: The Unexplored Land of Active Directory ACLs
An ACE Up The Sleeve: Designing Active Directory DACL Backdoors
An ACE Up The Sleeve – Designing Active Directory DACL Backdoors
Doomsday Preppers: Fortifying Your Red Team Infrastructure
Catch Me If You Can: PowerShell Red vs. Blue
BloodHound 1.3 – The ACL Attack Paths Update