Initial Access 7
- TokenSmith – Bypassing Intune Compliant Device Conditional Access
- Weaponize Your Word – Malicious Template Injection
- Adversary at the Door – Initial Access and what’s currently on the menu
- SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs
- How Cloud Migration is Affecting AppSec – A Red Teamer’s Perspective
- WASM Smuggling for Initial Access and W.A.L.K. Tool Release
- Why sneak when you can walk through the front door – A Love letter to Password Spraying against M365 in Red Team Engagements