Everything you need, in one place.
Onyx aggregates offensive security knowledge into a searchable, structured reference. Browse command cheat sheets, read detailed write-ups, and explore articles on AD exploitation, web security, and DFIR.
Recent Posts
View all →BloodHound Custom Cypher Query Cheat Sheet
Quick reference for the most useful BloodHound Cypher queries — from shortest paths to Kerberoastable DAs, custom tier analysis, and owned-node traversal.
Active Directory Attack Paths: Foothold to Domain Admin
A walkthrough of the most reliable AD attack chain — from low-privileged shell to Domain Admin using AS-REP roasting, Kerberoasting, and DCSync.
HTB Forest — AS-REP Roasting to DCSync via Exchange ACL Abuse
Forest is a Windows domain controller box. The path involves AS-REP roasting an account without pre-auth, then exploiting Exchange Windows Permissions to gain DCSync rights.
Command References
Open cheat sheets →Star the repo and contribute.
Improve commands, add write-ups, fix inaccuracies. Every contribution makes the reference sharper.