// select platform

Pentesting Knowledge Base

In-depth attack chain documentation paired with hands-on command references for each phase.

🏴 Active Directory AD pentesting, Kerberos, LDAP, lateral movement
soon 🪟 Windows Local privesc, credential dumping, AV evasion
soon 🐧 Linux SUID abuse, cron jobs, kernel exploits

How it works

01 / LEARN

Read the articles

Each attack phase has in-depth articles explaining the technique, tooling, and theory.

02 / DO

Run the commands

Switch to the Commands tab for a stripped-down Hackpack — ready to copy & paste when you're in the field.

03 / PRACTICE

Build the lab

Set up your own AD environment with the step-by-step guides on ActiveDirectoryLabs.