01Credential harvesting methods like LLMNR poisoning and NTLM relaying
02Quick-reference tables for tool selection and environment constraints
03Comprehensive Active Directory attack workflows including Golden Ticket and DCSync
0446 GitHub stars
05Linux-specific escalation via Sudo, Cron, and Kernel capabilities
06Windows service abuse and token impersonation techniques