Music |
Video |
Movies |
Chart |
Show |
Atomic Spotlight: User Account Control Bypasses with UACME Project Executables (Antisyphon Training) View | |
Bypassing User Account Control (Defense Evasion) (Attack Detect Defend (rot169)) View | |
Atomic Spotlight: User Account Control Bypasses with UACME Project Executables (Black Hills Information Security) View | |
Privilege Escalation on Windows 10 by bypassing UAC - Vinod Senthil (Vinod Senthil) View | |
Atomic Spotlight: Registry dump of SAM, creds, and secrets | Carrie Roberts (Antisyphon Training) View | |
AttackDefense UAC Bypass: UACME Lab Walkthrough (sudoheader) View | |
UAC Bypass using FODhelper.exe (Vinod Senthil) View | |
Atomic Spotlight: Defense Evasion with PowerShell Encoded Command (Black Hills Information Security) View | |
Atomic Spotlight: Dump LSASS Memory using direct system calls and API unhooking | Carrie Roberts (Antisyphon Training) View | |
Phantom Malware: Conceal Malicious Actions by Imitating User Activity (Paper summary and PoC) (Tim Niklas Witte) View |