{"id":5560,"date":"2021-07-07T00:16:57","date_gmt":"2021-07-06T16:16:57","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=5560"},"modified":"2021-07-07T00:17:16","modified_gmt":"2021-07-06T16:17:16","slug":"aclpwn-py-exploit-acl-based-privilege-escalation-paths-in-active-directory","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2021\/07\/aclpwn-py-exploit-acl-based-privilege-escalation-paths-in-active-directory\/","title":{"rendered":"Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory"},"content":{"rendered":"

Aclpwn.py is a tool that interacts with BloodHound<\/a> to identify and exploit ACL based privilege escalation paths.<\/p>\n

\"Aclpwn.Py<\/p>\n