Use when you need a practical operating guide for impacket, netexec, and bloodhound in Windows and AD environments.
Use this skill when internal Windows infrastructure is in play and you need a structured AD workflow.
netexec for fast credential validation and service reachability.impacket for focused protocol actions, secrets extraction, or remote exec.bloodhound-python only when graph collection is justified by the target state.kerbrute only in controlled, scoped ways.mimikatz as a Windows-side staged tool, not a Linux execution target.