diff --git a/Methodology and Resources/Active Directory Attack.md b/Methodology and Resources/Active Directory Attack.md
index 9af421a..d379470 100644
--- a/Methodology and Resources/Active Directory Attack.md
+++ b/Methodology and Resources/Active Directory Attack.md
@@ -141,6 +141,17 @@
ntlmrelayx.py -t ldaps://lab.local -wh attacker-wpad --delegate-access
```
+* [AzureHound](https://posts.specterops.io/introducing-bloodhound-4-0-the-azure-update-9b2b26c5e350)
+
+ ```powershell
+ # require: Install-Module -name Az -AllowClobber
+ # require: Install-Module -name AzureADPreview -AllowClobber
+ Connect-AzureAD
+ Connect-AzAccount
+ . .\AzureHound.ps1
+ Invoke-AzureHound
+ ```
+
* [PowerSploit](https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon)
```powershell
diff --git a/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd.svg b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd.svg
new file mode 100644
index 0000000..64cb757
--- /dev/null
+++ b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd.svg
@@ -0,0 +1,5 @@
+
\ No newline at end of file
diff --git a/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd_html.svg b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd_html.svg
new file mode 100644
index 0000000..7981193
--- /dev/null
+++ b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd_html.svg
@@ -0,0 +1,5 @@
+
\ No newline at end of file