_____ Is Not a Security Boundary: Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software
Subverting & Restoring Trust in Windows
Nov 07, 2017
Windows Operating System Archaeology
Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure
How Graphs Changed The Way Hackers Attack
Not a Security Boundary: Bypassing User Account Control
Here Be Dragons: The Unexplored Land of Active Directory ACLs
An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research