Not The Hidden Wiki
- Active Directory Methodology - link
- Red Team Notes - link
- AD Home Lab - link
- Attacking Active Directory - link
- Active Directory Methodology - link
- Active Directory pentesting: cheatsheet and beginner guide - link
- Active Directory Exploitation Cheat Sheet - link
- Active Directory Exploitation Cheat Sheet - link
- Active Directory MindMap - link
- Enumeration MindMap - link
- Alternative ways to Pass the Hash (PtH) - link
- Kerberos cheatsheet - link
- Critical Unauthenticated RCE Vulnerability in MSMQ Service - link
- Windows File Transfer CheatSheet - link
- Playing with Relayed Credentials - link
- Diving into Pre-Created Computer Accounts - link
- Poc’ing Beyond Domain Admin - Part 1 - link
- The worst of both worlds: Combining NTLM Relaying and Kerberos delegation - link
- Combining NTLM Relaying and Kerberos delegation - link
- A comprehensive guide on relaying anno 2022 - link
- “Relaying” Kerberos - Having fun with unconstrained delegation - link
- Keeping Up with the NTLM Relay - link
- Relay - link
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory - link
- Active Directory Enumeration for Red Teams - link
- Do Not Trust This Group Policy - link
- CVE-2024-20656 – Local Privilege Escalation in the VSStandardCollectorService150 Service - link
- Most common Active Directory misconfigurations and default settings that put your organization at risk - link
- Fantastic Windows Logon types and Where to Find Credentials in Them - link
- GPOddity: exploiting Active Directory GPOs through NTLM relaying - link
- External Trusts Are Evil - link
- LDAP Queries for Offensive and Defensive Operations - link
- DES Is Useful... Sometimes - link
- New Attack Paths? AS Requested Service Tickets - link
- Abusing Windows’ tokens to compromise Active Directory without touching LSASS - link
- A notes page focusing on quick wins in Active Directory for red team activities. - link
- Active Directory Pentest - link