-
Tips and Tricks: Covert secret theft from self-hosted Integration Runtimes
-
Tips and Tricks: Post Compromise Abuse of Azure API Management
-
Abusing tcp tunneling in Azure Bastion
-
Just-in-time privilege escalation - A silver token for bypassing PIM
-
Abusing dynamic groups in Azure AD for privilege escalation