Intelligence brings some cool enumeration and exploitation techniques to own …
Enumerating network interfaces of a remote computer via MSRPC and exploit NTLMv1
Learn basic exploitation of Active Directory
Using BloodHound to discover abusable Active Directory groups