01Comprehensive domain enumeration and attack path visualization using BloodHound.
02Advanced Kerberos exploitation workflows including Golden and Silver Ticket generation.
03Credential harvesting techniques such as DCSync, Pass-the-Hash, and OverPass-the-Hash.
04Automated reconnaissance and vulnerability scanning for critical CVEs like ZeroLogon.
05Active Directory Certificate Services (AD CS) audit and exploitation templates.
061 GitHub stars