WWHF | Abusing Microsoft Office for Post-Exploitation - Kyle Avery - 1 Hour
TROOPERS23: Fact Based Post Exploitation - Office365 Edition
Microsoft Office Zero-Day Vulnerability | Follina | CVE-2022-30910 | Support Diagnostic Tool Exploit
Microsoft Exchange Deserialization to Post-Auth RCE (CVE-2021-28482)
Persist It: Using and Abusing Microsoft’s Fix It Patches by Jon Erickson
Abusing Windows Admin Shares (Lateral Movement)
Are Microsoft's employee metrics for remote work psychological abuse?
Abusing Microsoft Outlook 365 to Capture NTLM
DEF CON 21 - Joe Bialek - PowerPwning Post Exploiting By Overpowering PowerShell
Abusing Microsoft Dynamics 365 for Phishing
CVE-2015-2545 APT vs EMET 5.5 vs HitmanPro.Alert 3
#HITBCW2021 D1 - Attack Scenarios Abusing Azure Active Directory - Bill Ben Haim & Zur Ulianitzky
Linux Post Exploitation - PSW 726
Microsoft Teams Abuse w/ Matthew Eidelberg
Undercover Boss BLOWS UP on Store Manager
Phishing in a Macro-less World – Daniel Heinsen (SO-CON 2020)
Dozens of teacher abuse allegations prompt Kirkwood School District superintendent to launch investi
Windows Update Causes File Copying Failure! Zip Domain Abuse! WinXP Activation Hack!
Tech Employee Shares Video of Her Being Fired