Searching protocol for "pass-the-hash"
Lateral movement with stolen credentials.
Elastic Stack-powered AD threat detection.
Harvest Windows credentials and pivot.
Crack hashes and credential attacks fast.
Master AD exploitation and defense.
Interactive WinRM shell for Windows
Master Active Directory exploitation techniques.
Dominate Active Directory environments.
Remote SYSTEM shell via SMB
Simulate network traversal, test segmentation.