Redelegate - Vulnlab
active directory, mssql, ACLs, delegation
Retro2 - Vulnlab
Pre-Windows 2000 Computers, ACLs, RpcEptMapper registry key exploit
Reflection - Vulnlab
MSSQL, NTLM relay attacks, LAPS, and RBCD
Windows Privilege Escalation
practical techniques for abusing some windows privileges and built-in security groups
Abusing Resource-Based Constrained Delegation
Notes on how to abuse Resource-Based Constrained Delegation (RBCD) and SPN-less RBCD from linux
Phantom - Vulnlab
Medium-difficulty AD machine from Vulnlab, created by ar0x4. It involves SMB enumeration, decrypting a VeraCrypt file, gaining a shell through password reuse and escalating privileges by performing Resource-based Constrained Delegation on an SPN-less user.
Getting started with Sliver C2
Getting started with Sliver C2
ADCS Attacks with Certipy
ADCS Attacks with Certipy cheat sheet