01Detailed Active Directory attack vectors including Kerberoasting and AS-REP Roasting
02Comprehensive Linux escalation paths including Sudo, Cron, SUID, and Capabilities
031 GitHub stars
04Advanced Windows privilege techniques such as Token Impersonation and Service Abuse
05Ready-to-use command references for tools like Mimikatz, Rubeus, and Impacket
06Credential harvesting strategies using LLMNR poisoning and NTLM relay