References
- MS14-068 exploit: https://github.com/mubix/pykek
- Zerologon relay scenario: https://dirkjanm.io/a-different-way-of-abusing-zerologon/
- Zerologon change password scenario: https://www.thehacker.recipes/ad/movement/netlogon/zerologon
- Zerologon exploits: https://github.com/VoidSec/CVE-2020-1472 and https://github.com/dirkjanm/CVE-2020-1472
- Printnightmare exploitation constraints: https://www.thehacker.recipes/ad/movement/print-spooler-service/printnightmare#constraints
- Printnightmare exploit: https://github.com/cube0x0/CVE-2021-1675
- Windows version noPac exploit: https://github.com/cube0x0/noPac
- Linux version noPac exploit: https://github.com/WazeHell/sam-the-admin
- Local potato: https://decoder.cloud/2023/02/13/localpotato-when-swapping-the-context-leads-you-to-system/
- Remote Potato0: https://github.com/antonioCoco/RemotePotato0
- ACL mind map: https://www.thehacker.recipes/ad/movement/dacl
- SharpGPOAbuse tool: https://github.com...