01Detailed lateral movement assistance via Pass-the-Hash and Kerberoasting techniques
02Targeted wordlist generation via web scraping, pattern-based crunching, and mutation rules
03Optimized Hashcat and John the Ripper command generation for all attack modes
04Advanced hash identification for MD5, SHA, bcrypt, NTLM, and Kerberos formats
050 GitHub stars
06Automated credential spraying and brute-force strategies for RDP, SSH, and SMB