01Advanced Active Directory attack patterns like Kerberoasting and DCSync
02Windows privilege escalation techniques for services and token abuse
03Quick-reference troubleshooting for common exploitation roadblocks
04Credential harvesting methods using LLMNR poisoning and NTLM relay
050 GitHub stars
06Linux-specific escalation paths including Sudo, Cron, and Capabilities