Valid User (No Password)
Valid User (No Password) techniques and commands for Active Directory security assessment.
Trusts
Trusts techniques and commands for Active Directory security assessment.
SCCM
SCCM techniques and commands for Active Directory security assessment.
Persistence
Persistence techniques and commands for Active Directory security assessment.
No Credentials
No Credentials techniques and commands for Active Directory security assessment.
Man In The Middle (Listen and Relay)
Man In The Middle (Listen and Relay) techniques and commands for Active Directory security assessment.
Quick Compromise
Quick Compromise techniques and commands for Active Directory security assessment.
Low access (Privilege escalation)
Low access (Privilege escalation) techniques and commands for Active Directory security assessment.
Lateral Movement
Lateral Movement techniques and commands for Active Directory security assessment.
Know vulnerabilities authenticated
Know vulnerabilities authenticated techniques and commands for Active Directory security assessment.
Domain Admin
Domain Admin techniques and commands for Active Directory security assessment.
Kerberos Delegation
Kerberos Delegation techniques and commands for Active Directory security assessment.
Crack Hash
Crack Hash techniques and commands for Active Directory security assessment.
Valid Credentials (cleartext creds, nt hash, kerberos ticket)
Valid Credentials (cleartext creds, nt hash, kerberos ticket) techniques and commands for Active Directory security assessment.
Admin Access
Admin Access techniques and commands for Active Directory security assessment.
ADCS
ADCS techniques and commands for Active Directory security assessment.
ACLs/ACEs permissions
ACLs/ACEs permissions techniques and commands for Active Directory security assessment.
Building Windows Executables with GitHub Actions
A comprehensive explanation of how GitHub Actions compiles native Windows executables using hosted Windows runners and official build toolchains
Enable AVX/AVX2 Support in Kali VM on VirtualBox
Enable AVX/AVX2 Support in Kali VM on VirtualBox
timewrap: A Handy faketime Alias Using NTP
A shell function to run commands with time spoofing using faketime and NTP servers
Active Directory Certificate Services (AD CS) Exploitation – ESC Paths Cheatsheet
A concise, attacker-focused reference of Enterprise Security Control (ESC) abuse paths in Active Directory Certificate Services.
Web Shell via Polyglot ZIP + PDF Upload Bypass
Bypassing file upload filters using ZIP/PDF polyglots or directory tricks.
SeManageVolumePrivilege Exploit
SeManageVolumePrivilege Exploit – AD CS Certificate Theft to DA via Certipy
Certipy Shadow Credentials (KeyCredentialLink Abuse)
Covert lateral movement by injecting shadow credentials into a target user's object.