01Quick-reference guides for exploiting critical CVEs like ZeroLogon and PrintNightmare.
02Comprehensive Kerberos attack workflows including Kerberoasting and AS-REP Roasting.
03Detailed implementation patterns for credential extraction and lateral movement.
04Standardized procedures for auditing Active Directory Certificate Services (AD CS).
05Automated AD reconnaissance and attack path visualization with BloodHound.
060 GitHub stars