Harvesting Intune Device Scripts Without Tools
by Denis Andzakovic
• Feb 13 2026
Intune device scripts are bits of PowerShell that run on Intune managed devices. Much like Group Policy Objects in traditional Active Directory, these scripts can contain juicy information like secrets, privilege escalation paths, and more. The only problem is Microsoft doesn’t let you get them back out via the Intune portal, and I don’t always want to setup a whole Powershell environment. Let’s get them back out with just a web browser and curl.
Sensitive data in URLs: Why private links aren’t private anymore due to threat intelligence feeds
by Roy Sugiyama
• Jan 14 2026
Modern threat‑intelligence feeds and link scanners have made previously private links searchable by anyone, like that invoice link or the doctor’s notes you were emailed last week. This article explores this data exposure problem, and how developers can protect their applications from disclosing sensitive information when URLs are logged by security tools.
Primary Refresh Token Exploitation - Attacking Entra Authenticated Services, Bypassing Passwords and MFA
by Denis Andzakovic
• Dec 16 2025
This article demonstrates how a compromised Microsoft Entra ID‑joined device lets the attacker sign into any Entra authenticated service from anywhere on the Internet, bypassing passwords and MFA. We’ll discuss Primary Refresh Tokens and how to exploit this without dropping tools on the endpoint. This attack is also referred to as a pass-the-PRT attack.