How Graphs Changed The Way Hackers Attack
Not a Security Boundary: Bypassing User Account Control
Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research
An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
Here Be Dragons: The Unexplored Land of Active Directory ACLs
An ACE Up The Sleeve: Designing Active Directory DACL Backdoors
An ACE Up The Sleeve – Designing Active Directory DACL Backdoors
Doomsday Preppers: Fortifying Your Red Team Infrastructure
Catch Me If You Can: PowerShell Red vs. Blue