- C2
- Infrastructure
- AD
- ACL Abuse
- AD CS Abuse
- ADIDNS Abuse
- Attack Trusts
- Attack RODCs
- AV / EDR Evasion
- Authentication Coercion
- Credentials Harvesting
- Discovery
- DnsAdmins
- Dominance
- GPO Abuse
- Kerberos
- Key Credentials Abuse
- LAPS
- Lateral Movement
- LDAP
- NTLM
- Password Spraying
- Post Exploitation
- Pre-created Computers Abuse
- PrivExchange
- Privileges Abuse
- RID Cycling
- SCCM / MECM Abuse
- SMB
- RPC
- Token Manipulation
- User Hunt
- WSUS
- Zerologon
- DevOps
- DBMS
- Authentication Brute Force
- File Transfer
- IPMI
- Kiosk Breakout
- Low-Hanging Fruits
- LPE
- Networks
- NFS
- Persistence
- Pivoting
- Post Exploitation
- SNMP
- TFTP
- VNC
- AD
- Misc
- OSINT
- Password Brute Force
- Perimeter
- Shells
- Web
- Wi-Fi