01Adversary simulation based on the complete MITRE ATT&CK lifecycle
02Privilege escalation strategies for both Windows and Linux environments
030 GitHub stars
04Active Directory attack methodologies like Kerberoasting and DCSync
05Structured security reporting principles for documenting detection gaps
06Defense evasion techniques including LOLBins and obfuscation patterns