
from decepticon3,662
Playbook and workflows for Active Directory offensive operations: BloodHound ingestion, Kerberoasting, ADCS ESC scanning, DCSync and LAPS extraction.
This skill collects and documents a set of Active Directory offensive playbooks and workflows used by red-team automation agents. It provides step-by-step guidance for ingesting BloodHound data, identifying Kerberoast and AS-REP targets, auditing ADCS templates, performing DCSync checks, and extracting LAPS secrets. The content is aimed at automated attack-chain planning and tooling integration.
Use this skill when planning or automating Active Directory post-exploitation or red-team operations that require enumerating domain relationships, identifying privileges and sensitive principals, or preparing Kerberoasting/AS-REP campaigns. It activates on AD-focused tasks such as "run BloodHound ingest", "find Kerberoast targets", or "check for DCSync-prone principals."
Likely compatible with red-team/automation agents that expose shell and scripting tools (bash, Certipy, BloodHound ingest). Compatible agent types: autonomous hacking agents, CLI-based LLM agents, and tools that can call system commands.
This skill has not been reviewed by our automated audit pipeline yet.