Welcome to the Resources section — a growing archive of practical material I’ve used in my learning journey. This includes:

  • Tools and scripts for offensive and defensive security
  • Mind maps to visualize techniques and attack paths
  • Personal logs that document my progress, attempts, and lessons learned

Windows Active Directory Exploitation

1. BloodHound Series

This multi-part series dives into how BloodHound reveals privilege relationships in Active Directory environments. It covers enumeration methods, exploitation of misconfigurations, and actionable defense strategies — designed for both attackers mapping paths to Domain Admin and defenders tightening privilege boundaries.

📘 This Series Covers:

  1. Enumerating AD with BloodHound
  2. Attacking AD using Privilege Paths
  3. Detecting and Mitigating BloodHound Activity

More categories and tools will be added as I continue exploring and documenting new topics.

1 item under this folder.