01Integrated tool guidance for Mimikatz, Rubeus, Impacket, and Responder
02Linux escalation via Sudo, Cron, SUID binaries, and Capabilities
030 GitHub stars
04Credential harvesting techniques using LLMNR poisoning and NTLM relay
05Active Directory attack vectors like Kerberoasting and AS-REP Roasting
06Windows local escalation including Token Impersonation and Service Abuse