Attacking Active Directory from Windows means you already have a foothold — a domain-joined machine, a shell, or stolen credentials. The toolset includes PowerView, Rubeus, Mimikatz, SharpHound, Certify, Seatbelt, and PowerShell AD cmdlets.

Windows-based attacks are often faster and stealthier — you operate from within the domain, with access to Kerberos natively, and can leverage LOLBAS (Living Off the Land Binaries and Scripts) to reduce tool footprint.


TopicFile
Enumeration & Discoveryenumeration
Kerberos Attackskerberos-attacks
Credential Attackscredential-attacks
Delegation Attacksdelegation-attacks
Lateral Movementlateral-movement
Domain & Forest Trustsdomain-trusts
Persistencepersistence

Disclaimer: For educational purposes only. Unauthorized access to computer systems is illegal.