Tools and methodologies for investigating digital incidents and gathering electronic evidence. Task: Privilege EscalationExplore 1 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.
A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.