01Comprehensive AD reconnaissance and enumeration using BloodHound and PowerView
02Automated credential harvesting via Kerberoasting, AS-REP Roasting, and Password Spraying
03Advanced Kerberos exploitation including Golden Ticket, Silver Ticket, and OverPass-the-Hash
04Guided exploitation for critical domain vulnerabilities like ZeroLogon and PrintNightmare
0531,722 GitHub stars
06Privilege escalation techniques through DCSync, NTLM relay, and AD CS exploitation