Attacking Kerberos Deployments
Understanding the Windows SMB NTLM Weak Nonce Vulnerability
Adventures in Limited User Post Exploitation
Standing on the Shoulders of the Blue Monster: Hardening Windows Applications
Ushering in the Post-GRC World: Applied Threat Modeling