01Comprehensive system, user, and network enumeration commands
02Kernel vulnerability identification and exploit reference guide
03Token impersonation and 'Potato' attack methodology
04Advanced credential harvesting from registry, config files, and SAM hives
050 GitHub stars
06Service exploitation workflows for unquoted paths and weak permissions