Bruteforce spray attack with a given password.
Searches for interesting stuff through a windows domain, such as weak password users, privileged users, sql users and more.
Authenticates a remote sql server with a given credentials.
Searches for users allowed for gpo delegation.
Searches for users with "Write SPN" ACL allowing them to write a service prinicipal name for a domain account.
Scans and dumps the whole forest acl to csv.
Removes the ability of a given active directory object to read privileged users properties.
Returns potentially Pth events through event log parsing.