≡ Menu
Home > Windows Internals


Who Needs Macros? | Threat Actors Pivot to Abusing Explorer and Other LOLBins via Windows Shortcuts

Aleksandar Milenkoski, Jim Walter

4 August, 2022

Link


Inside Malicious Windows Apps for Malware Deployment

Aleksandar Milenkoski

14 July, 2022

Link


The TPM: Technical Overview of Microsoft’s Interim Measures against CVE-2017-15361

Aleksandar Milenkoski

29 May, 2020

PDF


Device Guard Image Integrity: Function Invocation Paths between ci.dll and skci.dll

Aleksandar Milenkoski

22 November, 2019

PDF


Windows Defender Application Control: Image verification

Aleksandar Milenkoski

25 October, 2019

PDF


Windows Defender Application Control: Initialization

Dominik Phillips, Aleksandar Milenkoski

25 October, 2019

PDF


Device Guard Image Integrity: Architecture Overview

Aleksandar Milenkoski

25 October, 2019

PDF


Virtual Secure Mode: Initialization

Dominik Phillips, Aleksandar Milenkoski

23 May, 2019

PDF


Virtual Secure Mode: Protections of Communication Interfaces

Aleksandar Milenkoski

23 May, 2019

PDF


Virtual Secure Mode: Communication Interfaces

Aleksandar Milenkoski

23 May, 2019

PDF


Virtual Secure Mode: Architecture Overview

Aleksandar Milenkoski

23 May, 2019

PDF


ELAM: The Windows Defender ELAM Driver

Aleksandar Milenkoski

21 May, 2019

PDF


The TPM: Workflow of the Manual and Automatic TPM Provisioning Processes

Aleksandar Milenkoski

21 May, 2019

PDF


The TPM: Integrity Measurement

Aleksandar Milenkoski

21 May, 2019

PDF


The TPM: Communication Interfaces

Aleksandar Milenkoski

21 May, 2019

PDF