Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology
ATT&CKing with Threat Intelligence
Threat-based Purple Teaming with ATT&CK
Working with Binary Data: Writing your own parser
Apr 19, 2018
Auditing Domain Trust Relationships
Apr 19, 2018
PowerShell, Reflection, and the Windows API
Apr 18, 2018
The Power of the Dark Side: Offensive PowerShell Workshop
The Unintended Risks of Trusting Active Directory
Subverting Trust in Windows