Below is a list of articles / websites which I’ve read and enjoyed. I recommend you check them out!
https://docs.mythic-c2.net/
https://swisskyrepo.github.io/InternalAllTheThings/redteam/evasion/elastic-edr/#setup
https://swisskyrepo.github.io/InternalAllTheThings/redteam/evasion/linux-evasion/#timestomping
https://swisskyrepo.github.io/InternalAllTheThings/redteam/evasion/windows-amsi-bypass/#summary
https://swisskyrepo.github.io/InternalAllTheThings/active-directory/kerberos-tickets/#pass-the-ticket-golden-tickets
https://swisskyrepo.github.io/InternalAllTheThings/command-control/cobalt-strike/#customer-id
https://swisskyrepo.github.io/InternalAllTheThings/command-control/cobalt-strike/#elevate-kit
https://swisskyrepo.github.io/InternalAllTheThings/command-control/metasploit/#scripting-metasploit
https://github.com/mandiant/SharPersist/wiki
https://malwaretech.com/2024/02/bypassing-edrs-with-edr-preload.html
https://adsecurity.org/?p=3458
https://learn.microsoft.com/en-gb/archive/blogs/pie/credential-theft-made-easy-with-kerberos-delegation
Event tracing for windows bypass
AMSI Bypass
https://linux.die.net/man/1/msktutil
https://www.youtube.com/channel/UCJU2r634VNPeCRug7Y7qdcw
https://github.com/nettitude/Aladdin?tab=readme-ov-file
https://mayfly277.github.io/posts/GOADv2/
https://maldevacademy.com/syllabus
https://www.netexec.wiki/
https://www.inetsim.org/features.html
https://pentestlab.blog/2022/03/21/unconstrained-delegation/
https://www.securityandit.com/network/kerberos-protocol-understanding/
https://www.tarlogic.com/blog/kerberos-iii-how-does-delegation-work/
https://www.hub.trimarcsecurity.com/post/leveraging-the-kerberos-bronze-bit-attack-cve-2020-17049-scenarios-to-compromise-active-directory
https://blog.improsec.com/tech-blog/the-mind-blowing-kerberos-use-any-authentication-protocol-delegation
https://learn.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/configure-kerberos-delegation-group-managed-service-accounts
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_identity_management/assembly_using-constrained-delegation-in-idm_configuring-and-managing-idm#doc-wrapper