01Detailed Kerberos attack modules including roasting and ticket forgery
02Step-by-step guidance for critical AD CVE exploitation
03Credential extraction and lateral movement command references
04Comprehensive AD reconnaissance and path visualization workflows
050 GitHub stars
06Standardized procedures for DCSync and NTLM relay attacks