npx claudepluginhub kalpmodi/akiraThis skill uses the workspace's default tool permissions.
AD attack TTPs have been consolidated into the **redteam** skill, which is the canonical source for all AD, post-exploitation, lateral movement, and APT simulation techniques.
Provides Active Directory attack techniques: reconnaissance with BloodHound/PowerView, credential harvesting, Kerberos attacks with Rubeus, lateral movement, privilege escalation for authorized pentesting.
Provides BloodHound Cypher queries for Active Directory attacks: shortest paths to Domain Admin, Kerberoastable/AS-REP accounts, unconstrained delegation, high-value targets, and misconfigs. For AD pentesting.
Executes authorized attack simulations against Active Directory to identify misconfigurations, weak credentials, privilege escalation paths, and trust exploits using BloodHound, Mimikatz, and Impacket.
Share bugs, ideas, or general feedback.
AD attack TTPs have been consolidated into the redteam skill, which is the canonical source for all AD, post-exploitation, lateral movement, and APT simulation techniques.
Immediately invoke:
/redteam <target> --focus=ad
The --focus=ad flag tells redteam to prioritize:
All techniques are documented in ~/.claude/skills/redteam/SKILL.md under Classes RT04, RT05, RT05b, RT05c.
For full APT kill chain (C2, LotL, AMSI bypass, persistence, defense evasion, cloud APT, exfil, OPSEC) run /redteam <target> without the focus flag after obtaining a foothold.