An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research
An ACE Up The Sleeve: Designing Active Directory DACL Backdoors
An ACE Up The Sleeve – Designing Active Directory DACL Backdoors
Doomsday Preppers: Fortifying Your Red Team Infrastructure
Catch Me If You Can: PowerShell Red vs. Blue
BloodHound 1.3 – The ACL Attack Paths Update