#tools
#Red_Team_Tactics
1. Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise
https://github.com/MWR-CyberSec/AD-CS-Forest-Exploiter
2. Databricks JDBC Attack via JAAS
https://blog.pyn3rd.com/2024/12/13/Databricks-JDBC-Attack-via-JAAS
3. Generate a proxy dll for arbitrary dll
https://github.com/namazso/dll-proxy-generator
#Red_Team_Tactics
1. Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise
https://github.com/MWR-CyberSec/AD-CS-Forest-Exploiter
2. Databricks JDBC Attack via JAAS
https://blog.pyn3rd.com/2024/12/13/Databricks-JDBC-Attack-via-JAAS
3. Generate a proxy dll for arbitrary dll
https://github.com/namazso/dll-proxy-generator