# Post Compromise Enumeration - Resources

{% embed url="<https://docs.microsoft.com/en-us/troubleshoot/windows-server/identity/useraccountcontrol-manipulate-account-properties#list-of-property-flags>" %}
List of AD property flags for ldap queries
{% endembed %}

{% embed url="<https://github.com/awsmhacks/awsmBloodhoundCustomQueries>" %}
Custom queries in Bloodhound - awsmhacks
{% endembed %}

{% embed url="<https://github.com/CompassSecurity/BloodHoundQueries/blob/master/customqueries.json>" %}
Custom queries in Bloodhound - Compass Security
{% endembed %}

{% embed url="<https://github.com/hausec/Bloodhound-Custom-Queries>" %}
Custom queries in Bloodhound - Hausec
{% endembed %}

{% embed url="<https://academy.hackthebox.com/course/preview/active-directory-bloodhound>" %}
ACTIVE DIRECTORY BLOODHOUND on HTB Academy
{% endembed %}

{% embed url="<https://sansorg.egnyte.com/dl/zscX9KYH5M>" %}
sans institute cheat sheet with custom db queries
{% endembed %}

{% embed url="<https://academy.tcm-sec.com/p/movement-pivoting-and-persistence-for-pentesters-and-ethical-hackers>" %}
Movement, Pivoting, and Persistence
{% endembed %}

{% embed url="<https://ernw.de/download/BloodHoundWorkshop/ERNW_DogWhispererHandbook.pdf>" %}
The dog whisperer handbook
{% endembed %}
