Bypass Kerberoast detections with modified KDC options and encryption types.
#bypass #encryption #kerberos
Series of tools for attacking MS Kerberos implementations.
#kerberos
Extracts Key Values from .keytab files.
#hash #kerberos #keytab #ntlm #utils
Find misconfiguration through LDAP to exploit weaknesses with Kerberos.
#activedirectory #kerberos #ldap #windows