01Exploitation patterns for cron jobs, PATH hijacking, and NFS
02Sudo and SUID binary misconfiguration analysis via GTFOBins
03Automated enumeration script deployment (LinPEAS, LinEnum)
04Comprehensive system and network enumeration workflows
05Kernel vulnerability identification and exploit mapping
060 GitHub stars