Certified Pre-Owned
2021-06-17 23:56:53  •  阅读 160 •  点我收藏   
A Case Study in Wagging the Dog: Computer Takeover
2019-03-01 04:08:02  •  阅读 32 •  点我收藏   
Kerberoasting Revisited
2019-02-21 02:07:21  •  阅读 38 •  点我收藏   
Not A Security Boundary: Breaking Forest Trusts
2018-11-29 02:57:09  •  阅读 35 •  点我收藏   
Another Word on Delegation
2018-10-26 02:33:24  •  阅读 39 •  点我收藏   
Rubeus – Now With More Kekeo
2018-10-04 23:11:12  •  阅读 30 •  点我收藏   
From Kekeo to Rubeus
2018-09-25 03:00:43  •  阅读 35 •  点我收藏   
Operational Guidance for Offensive User DPAPI Abuse
2018-08-23 02:56:41  •  阅读 35 •  点我收藏   
GhostPack
2018-07-25 04:06:03  •  阅读 56 •  点我收藏   
The PowerView PowerUsage Series #5
2018-07-18 02:56:35  •  阅读 31 •  点我收藏   
Remote Hash Extraction On Demand Via Host Security Descriptor Modification
2018-04-11 03:08:40  •  阅读 32 •  点我收藏