01Persistence mechanism guidance and credential harvesting workflows
02Linux Sudo and SUID exploitation patterns based on GTFOBins
03Comprehensive Active Directory attack methods including Kerberoasting
04Quick-reference matrix for selecting techniques based on target environment
050 GitHub stars
06Windows Service and Token Impersonation techniques