010 GitHub stars
02Linux-specific exploitation for Sudo, SUID, and Cron tasks
03Troubleshooting guide for common exploitation failures
04Windows service abuse and token impersonation techniques
05Comprehensive Active Directory attack vectors including Kerberoasting
06Credential harvesting and NTLM relaying commands