📖
Notes
Search...
Ctrl
K
CyberSecurity
Penetration Testing
TryHackMe
Main Methodology
4. Post Exploitation
Windows Active Directory
Additional Resources
Previous
Maintaining Access
Next
5. Covering Tracks
Last updated
1 year ago
Resources
Tools/Malware Used
https://blog.harmj0y.net/
https://adsecurity.org/?page_id=1821
https://metasploit.help.rapid7.com/docs/about-post-exploitation
http://www.pentest-standard.org/index.php/Post_Exploitation
https://offsec.red/mimikatz-cheat-sheet/
https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
https://github.com/gentilkiwi/mimikatz
https://github.com/BloodHoundAD/BloodHound/blob/master/Ingestors/SharpHound.ps1
https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1