๐ Table of Contents
- ๐ฏ Overview & Capabilities
- ๐ง Initial Setup & Bypasses
- ๐ Credential Extraction
- ๐๏ธ Kerberos Attacks
- ๐ก๏ธ System Secrets
- ๐ผ Credential Vaults
- ๐ญ Token Manipulation
- ๐ DPAPI & Protected Data
- ๐ Certificate Management
- ๐ ๏ธ Advanced Techniques
- ๐ Remote Execution
- ๐ฅท Defense Evasion
- โก Quick References
- โ ๏ธ Detection & OPSEC
- ๐งช Troubleshooting
-
hardening