01Credential extraction and lateral movement via DCSync and Pass-the-Hash
02Exploitation guidance for Active Directory Certificate Services (AD CS) misconfigurations
03Workflow patterns for testing critical domain vulnerabilities like ZeroLogon and PrintNightmare
04Comprehensive AD reconnaissance and attack path visualization using BloodHound
05Advanced Kerberos exploitation techniques including Kerberoasting and ticket forging
061 GitHub stars