Welcome to the Resources section — a growing archive of practical material I’ve used in my learning journey. This includes:
- Tools and scripts for offensive and defensive security
- Mind maps to visualize techniques and attack paths
- Personal logs that document my progress, attempts, and lessons learned
Windows Active Directory Exploitation
1. BloodHound Series
This multi-part series dives into how BloodHound reveals privilege relationships in Active Directory environments. It covers enumeration methods, exploitation of misconfigurations, and actionable defense strategies — designed for both attackers mapping paths to Domain Admin and defenders tightening privilege boundaries.
📘 This Series Covers:
- Enumerating AD with BloodHound
- Attacking AD using Privilege Paths
- Detecting and Mitigating BloodHound Activity
More categories and tools will be added as I continue exploring and documenting new topics.