# Microsoft Windows

- [Windows OS](/notes/microsoft-windows/windows-os.md)
- [Active Directory](/notes/microsoft-windows/windows-os/active-directory.md)
- [System Information](/notes/microsoft-windows/windows-os/system-information.md)
- [System Configuration Utility (MSConfig)](/notes/microsoft-windows/windows-os/system-information/system-configuration-utility-msconfig.md)
- [Change UAC Settings](/notes/microsoft-windows/windows-os/system-information/system-configuration-utility-msconfig/change-uac-settings.md)
- [Computer Management (compmgmt)](/notes/microsoft-windows/windows-os/system-information/system-configuration-utility-msconfig/computer-management-compmgmt.md)
- [System Information (msinfo32)](/notes/microsoft-windows/windows-os/system-information/system-configuration-utility-msconfig/system-information-msinfo32.md)
- [Resource Monitor (resmon)](/notes/microsoft-windows/windows-os/system-information/system-configuration-utility-msconfig/resource-monitor-resmon.md)
- [Registry Editor](/notes/microsoft-windows/windows-os/system-information/system-configuration-utility-msconfig/registry-editor.md)
- [Event Viewer](/notes/microsoft-windows/windows-os/system-information/event-viewer.md)
- [Command Prompt](/notes/microsoft-windows/windows-os/system-information/command-prompt.md)
- [Privilege Escalation](/notes/microsoft-windows/windows-os/privilege-escalation.md)
- [Enumerating Windows](/notes/microsoft-windows/windows-os/privilege-escalation/enumerating-windows.md)
- [Windows Privileges and Access Control Mechanisms](/notes/microsoft-windows/windows-os/privilege-escalation/enumerating-windows/windows-privileges-and-access-control-mechanisms.md)
- [PowerShell Logs and Information](/notes/microsoft-windows/windows-os/privilege-escalation/enumerating-windows/powershell-logs-and-information.md)
- [Automated Enumeration Tools](/notes/microsoft-windows/windows-os/privilege-escalation/enumerating-windows/automated-enumeration-tools.md)
- [Service Binary Hijacking](/notes/microsoft-windows/windows-os/privilege-escalation/service-binary-hijacking.md)
- [DLL Hijacking](/notes/microsoft-windows/windows-os/privilege-escalation/dll-hijacking.md)
- [Unquoted Service Path](/notes/microsoft-windows/windows-os/privilege-escalation/unquoted-service-path.md)
- [Scheduled Tasks](/notes/microsoft-windows/windows-os/privilege-escalation/scheduled-tasks.md)
- [Using Exploits](/notes/microsoft-windows/windows-os/privilege-escalation/using-exploits.md)
- [Group](/notes/microsoft-windows/windows-os/privilege-escalation/group.md)
- [Potatoes - Windows Privilege Escalation](/notes/microsoft-windows/windows-os/privilege-escalation/potatoes-windows-privilege-escalation.md)
- [BloodyAD](/notes/microsoft-windows/windows-os/privilege-escalation/bloodyad.md)
- [Active Directory (AD)](/notes/microsoft-windows/active-directory-ad.md)
- [General Information](/notes/microsoft-windows/active-directory-ad/general-information.md)
- [Active Directory - Certificate Services](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-certificate-services.md)
- [Active Directory - Authentication Methods](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods.md)
- [Cached AD Credentials](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/cached-ad-credentials.md)
- [Password Attacks / Brute Force](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/password-attacks-brute-force.md)
- [Password Spraying Kerberos Authentication](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/password-attacks-brute-force/password-spraying-kerberos-authentication.md)
- [Kerberoasting](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/kerberoasting.md)
- [AS-REP Roasting](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/as-rep-roasting.md)
- [Silver Tickets](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/silver-tickets.md)
- [Domain Controller Synchronization](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/domain-controller-synchronization.md)
- [Kerberos Ticket Authentication](/notes/microsoft-windows/active-directory-ad/general-information/active-directory-authentication-methods/kerberos-ticket-authentication.md)
- [Initial Access](/notes/microsoft-windows/active-directory-ad/initial-access.md)
- [Recon](/notes/microsoft-windows/active-directory-ad/recon.md)
- [Powershell .NET Recon](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon.md)
- [Domain and Forest Information](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/domain-and-forest-information.md)
- [Service Discovery without Network Scanning](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/service-discovery-without-network-scanning.md)
- [Service Account Discovery](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/service-account-discovery.md)
- [Discover Computers without Network Scanning](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/discover-computers-without-network-scanning.md)
- [Discover Admin Accounts](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/discover-admin-accounts.md)
- [Identify Groups with Local Admin Rights](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/identify-groups-with-local-admin-rights.md)
- [Discovery External Email Addresses](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/discovery-external-email-addresses.md)
- [Discover Domain Password Policy](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/discover-domain-password-policy.md)
- [Identity Managed Service Accounts & Group Managed Service Accounts](/notes/microsoft-windows/active-directory-ad/recon/powershell-.net-recon/identity-managed-service-accounts-and-group-managed-service-accounts.md)
- [Enumerating AD \[Legacy Notes\]](/notes/microsoft-windows/active-directory-ad/recon/enumerating-ad-legacy-notes.md)
- [Page 1](/notes/microsoft-windows/active-directory-ad/recon/page-1.md)
- [Tools](/notes/microsoft-windows/active-directory-ad/tools.md)
- [BloodHound](/notes/microsoft-windows/active-directory-ad/tools/bloodhound.md)
- [SharpHound](/notes/microsoft-windows/active-directory-ad/tools/bloodhound/sharphound.md)
- [Mimikatz](/notes/microsoft-windows/active-directory-ad/tools/mimikatz.md)
- [Commands](/notes/microsoft-windows/active-directory-ad/tools/mimikatz/commands.md)
- [Command Line and Interactive Use](/notes/microsoft-windows/active-directory-ad/tools/mimikatz/command-line-and-interactive-use.md)
- [Detecting Mimikatz](/notes/microsoft-windows/active-directory-ad/tools/mimikatz/detecting-mimikatz.md)
- [Detecting Invoke-Mimikatz](/notes/microsoft-windows/active-directory-ad/tools/mimikatz/detecting-invoke-mimikatz.md)
- [Detecting Offensive PowerShell Tools](/notes/microsoft-windows/active-directory-ad/tools/mimikatz/detecting-offensive-powershell-tools.md)
- [Mimikatz Usage](/notes/microsoft-windows/active-directory-ad/tools/mimikatz/mimikatz-usage.md)
- [Techniques](/notes/microsoft-windows/active-directory-ad/techniques.md)
- [Pivoting](/notes/microsoft-windows/active-directory-ad/techniques/pivoting.md)
- [Legacy Notes](/notes/microsoft-windows/active-directory-ad/legacy-notes.md)
- [Privilege Escalation with bloodyAD](/notes/microsoft-windows/active-directory-ad/legacy-notes/privilege-escalation-with-bloodyad.md)
- [Abusing ACLs/ACEs](/notes/microsoft-windows/active-directory-ad/legacy-notes/abusing-acls-aces.md)
- [Active Directory Persistence](/notes/microsoft-windows/active-directory-ad/legacy-notes/active-directory-persistence.md)
- [Lateral Movement in AD](/notes/microsoft-windows/active-directory-ad/legacy-notes/lateral-movement-in-ad.md)
- [WinRM for Lateral Movement](/notes/microsoft-windows/active-directory-ad/legacy-notes/lateral-movement-in-ad/winrm-for-lateral-movement.md)
- [SSH Tunneling / Port Forwarding](/notes/microsoft-windows/active-directory-ad/legacy-notes/lateral-movement-in-ad/ssh-tunneling-port-forwarding.md)
- [Attacking GPP (Group Policy Preferences) Credentials](/notes/microsoft-windows/active-directory-ad/legacy-notes/attacking-gpp-group-policy-preferences-credentials.md)
- [NTLM](/notes/microsoft-windows/active-directory-ad/legacy-notes/ntlm.md)
- [Domain Enumeration + Exploitation](/notes/microsoft-windows/active-directory-ad/legacy-notes/domain-enumeration-+-exploitation.md)
- [PowerShell Tricks](/notes/microsoft-windows/powershell-tricks.md)
- [Base64 Encode Payload](/notes/microsoft-windows/powershell-tricks/base64-encode-payload.md)
- [Enable Windows RDP](/notes/microsoft-windows/powershell-tricks/enable-windows-rdp.md)
- [Evil-WinRM](/notes/microsoft-windows/evil-winrm.md)
