psexec.pySMB RCE shell (NOISY)
wmiexec.pyWMI semi-interactive shell
smbexec.pySMB bat-file exec (noisy)
dcomexec.pyDCOM shell (stealthy)
atexec.pyAT/Task Scheduler exec
secretsdump.pySAM/LSA/NTDS dump
ntlmrelayx.pyNTLM relay attacks
GetUserSPNs.pyKerberoasting
GetNPUsers.pyASREPRoasting
getTGT.pyRequest TGT ticket
getST.pyService ticket / S4U
ticketer.pyGolden/Silver tickets
ticketConverter.pykirbi ↔ ccache
findDelegation.pyDelegation enum
rbcd.pyRBCD attribute write
smbclient.pySMB file browser
lookupsid.pySID brute force / enum
samrdump.pySAMR user enum
GetADUsers.pyAD user enumeration
addcomputer.pyAdd machine account
mssqlclient.pyMSSQL shell
dpapi.pyDPAPI secret extraction
raiseChild.pyChild→Forest DA
goldenPac.pyMS14-068 PAC exploit
getPac.pyDump PAC of user
rpcdump.pyRPC endpoint dump
rdp_check.pyTest RDP credentials
Get-GPPPassword.pyGPP password extract
reg.pyRemote registry access
netview.pySession tracking
wmipersist.pyWMI persistence
smbserver.pyRogue SMB server