Sponsored Event
Azure Privilege Escalation via Azure API Permissions Abuse Past
Free IPA – Attacking The Active Directory Of Linux
How Not to Shoot yourself in the Foot with Patterns
Walking the Bifrost: An Operator’s Guide to Heimdal & Kerberos on macOS
Understanding Windows Access Token Manipulation
Waking up the data engineer in you!
Practical Heuristic Exploitation
Not A Security Boundary: Breaking Forest Trusts