
Automating COM/DCOM vulnerability research
Diving into COM/DCOM and how to automate vulnerability research using a fuzzing approach.

Diving into COM/DCOM and how to automate vulnerability research using a fuzzing approach.

Showcasing some different ways to craft exploits for vulnerabilities over MS-RPC

Partially solving the problem for procedures that need valid complex parameter types to fuzz, and open sourcing the tool

Diving into the MS-RPC protocol and how to automate vulnerability research using a fuzzing approach.

CVE-2025-26651: Revealing a vulnerability in Windows Local Session Manager (LSM), that causes it to crash

Having fun with Pass the Certificate and Kerberos errors and how to work around them

Crashing Windows by exploiting two vulnerabilities in the power service

Using NTLMRelay2self with RBCD and BloodyAD to escalate privileges on a Windows system with LDAPS being blocked on the domain controller.

Defeating Credential Guard by misusing its own functions

Using NTLM Relay to authenticate a system to itself over HTTP with WebDav without Printer Spooler and DNS