01Detailed persistence strategies including Golden and Silver Ticket generation
02Advanced credential dumping techniques using DCSync and LSASS memory parsing
03Comprehensive Kerberos attack workflows for Kerberoasting and ASREPRoasting
04Multi-platform lateral movement guidance for Windows and Linux environments
05BloodHound Cypher query integration for identifying complex attack paths
060 GitHub stars