01Quick-reference tool mapping for rapid post-exploitation execution
02Credential harvesting methods using LLMNR poisoning and NTLM relaying
03Windows exploitation techniques including Token Impersonation and Service abuse
04Linux-specific escalation via Sudo, Cron jobs, and Capability abuse
051 GitHub stars
06Active Directory attack patterns like Kerberoasting, AS-REP Roasting, and Golden Tickets