01Credential harvesting and extraction techniques using Impacket, Mimikatz, and Responder.
021 GitHub stars
03Guided Kerberos attack workflows including Kerberoasting, AS-REP roasting, and ticket forging.
04Lateral movement and privilege escalation strategies for comprehensive domain security auditing.
05Automated AD reconnaissance and attack path visualization using BloodHound and SharpHound.
06Step-by-step exploitation guides for critical vulnerabilities like ZeroLogon, PrintNightmare, and ESC1.