Network Pentesting
10 tools · Internal network exploitation, Active Directory, pivoting, and lateral movement
Network Exploitation Tools
Credential capture, relay attacks, remote shells, and tunneling
Active Directory
Tools for enumeration, pivoting, and exploitation of AD environments