01Active Directory attack methodologies including Kerberoasting and Golden Tickets
02Comprehensive Linux privilege escalation paths (Sudo, SUID, Cron)
03Credential harvesting and NTLM relaying guidance
042,883 GitHub stars
05Step-by-step command references for security auditing tools
06Advanced Windows escalation techniques (Token Impersonation, Service Abuse)