01Comprehensive system, user, and network enumeration
022,883 GitHub stars
03Detection and exploitation of writable cron jobs and PATH hijacking
04Sudo and SUID binary exploitation via GTFOBins patterns
05Automated identification of vulnerable kernel versions and exploits
06Security capability and NFS share vulnerability assessment