.NET Assembly Obfuscation for Memory Scanner Evasion
dotnetmalware-developmentobfuscation "Relaying" Kerberos - Having fun with unconstrained delegation
active-directorykerberoskerberos-delegationunconstrained-delegation (Ab)using the Microsoft Identity Platform: Exploring Azure AD Token Caching
(Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits
malware-developmentrootkit [Cracking Windows Kernel with HEVD] Chapter 0: Where do I start?
malware-developmentrootkit 0 Click ATO with the Sandwich Attack
A "deep dive" in Cert Publishers Group
active-directoryad-groupsadcs A Case Study in Wagging the Dog: Computer Takeover
active-directorykerberoskerberos-delegationresource-based-constrained-delegation A Guide to Attacking Domain Trusts
active-directoryad-trusts A Hands-On Edition: Will Supabase Be the Next Firebase (At Least in Terms of Security)?
A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)
A Process is No One: Hunting for Token Manipulation
access-tokenmalware-developmentwindows A smorgasbord of a bug chain: postMessage, JSONP, WAF bypass, DOM-based XSS, CORS, CSRF...
A Strange Case of Trusts, Machine Accounts and DNS
active-directoryad-trusts A Syscall Journey in the Windows Kernel
malware-developmentsyscall A universal EDR bypass built in Windows 10
AAD Joined Machines - The New Lateral Movement
Abusing AD FS Replication: Stealing AD FS Secrets Over the Network
Abusing Azure AD SSO with the Primary Refresh Token
Abusing Client-Side Desync on Werkzeug