01Detailed implementation guides for Kerberos attacks including Kerberoasting and AS-REP Roasting
02Step-by-step guidance for NTLM relaying and Active Directory Certificate Services (AD CS) attacks
03Comprehensive AD reconnaissance and visualization workflows using BloodHound and PowerView
04Advanced credential extraction techniques such as DCSync and Pass-the-Hash
05Exploitation procedures for critical vulnerabilities like ZeroLogon and PrintNightmare
060 GitHub stars