A collection of techniques that exploit and abuse Active Directory, Kerberos authentication, Domain Controllers and similar matters.
Last updated 2 years ago