Searching protocol for "lateral-movement"
Detect lateral movement via PsExec and WMI.
Simulate network traversal, test segmentation.
Holistic investigations and documentation
AD security assessment with Kerberoasting.
Correlate logs for security insights.
Dominate Active Directory environments.
Lateral movement with stolen credentials.
Execute adversary simulations.
Master red-team tactics with MITRE ATT&CK.
Recover saved credentials.
Post-exploitation C2 framework.
Internal network and AD pentesting toolkit.