BloodyAD

Have You Looked in the Trash? Unearthing Privilege Escalations from the Active Directory Recycle Bin featured image

Have You Looked in the Trash? Unearthing Privilege Escalations from the Active Directory Recycle Bin

How overlooked objects in AD's Recycle Bin can become a goldmine for attackers—and what defenders need to know

avatar
Baptiste Crépin
Read more
Performing AD LDAP Queries Like a Ninja featured image

Performing AD LDAP Queries Like a Ninja

Strategies to minimize logging generation, and methods to enhance logging efficiency

avatar
Baptiste Crépin
Read more
Exploiting Certifried (CVE-2022-26923) featured image

Exploiting Certifried (CVE-2022-26923)

Discover how to exploit the certifried vulnerability easily with bloodyAD.

Soka
Read more
Playing with Kerberos featured image

Playing with Kerberos

Take full control of the Kerberos protocol on Active Directory using bloodyAD.

avatar
Baptiste Crépin
Read more
Certificate authentication dug up featured image

Certificate authentication dug up

Leverage certificate-based authentication power on Active Directory environment.

avatar
Baptiste Crépin
Read more