01Credential harvesting techniques using LLMNR poisoning and NTLM relay
02Reference patterns for security tools like Mimikatz, Rubeus, and Impacket
03Active Directory attack workflows for Kerberoasting and DCSync
040 GitHub stars
05Linux escalation via Sudo, Cron, Capabilities, and NFS
06Windows local elevation including Token Impersonation and Service Abuse