AD Cheatsheet: Enumeration & Fundamentals
Mar 19, 2026Active Directory enumeration techniques for penetration testers - DNS, SMB, LDAP, RPC, and initial domain reconnaissance
AD Cheatsheet: Kerberos Attacks
Mar 19, 2026Complete guide to Kerberos-based attacks - Kerberoasting, AS-REP Roasting, Golden/Silver Tickets, Pass-the-Ticket, and Delegation abuse
AD Cheatsheet: ADCS & Certificate Attacks
Mar 19, 2026Active Directory Certificate Services exploitation - ESC1 through ESC16, Certifried, enumeration and attack chains
AD Cheatsheet: ACE Abuse & Lateral Movement
Mar 19, 2026Active Directory ACL exploitation, DPAPI secrets, credential dumping, Shadow Credentials, and remote access techniques
AD Cheatsheet: NTLM Relay Attacks
Mar 19, 2026Complete NTLM relay guide - poisoning, coercion, SMB/LDAP/ADCS relay, and cross-protocol exploitation
AD Cheatsheet: Trust Exploitation
Mar 19, 2026Active Directory trust attacks - intra-forest and cross-forest exploitation, ExtraSids, SID History, PAM Trust abuse
AD Cheatsheet: MSSQL, Exchange & SCCM
Mar 19, 2026Exploiting enterprise services in Active Directory - MSSQL lateral movement, Exchange phishing, and SCCM takeover
AD Cheatsheet: BloodyAD & Advanced Tooling
Mar 19, 2026BloodyAD command reference and advanced Active Directory tooling for penetration testers
HTB - TombWatcher
Jun 7, 20254 seasonal box from hackthebox
Portswigger - Blind SQL injection with conditional errors
Mar 29, 2025Advanced blind SQL injection challenge using conditional error-based techniques to extract sensitive data
PicoCTF - Mini RSA
Mar 29, 2025Mini RSA is a crypto CTF Challenge from PicoCTF involving small public exponent attacks on RSA encryption
Rop Emporium - Ret2Win
Mar 29, 2025Introduction to Return Oriented Programming (ROP) through a beginner-friendly buffer overflow challenge