Post-Exploitation
- Post-Exploitation Unix
- Post-Exploitation Windows
- Lateral movements
- File transfer
- Privilege escalation
- Patches Detection
- Services and Processes
- Registry
- Schedules Tasks
- Startup Applications
- Password mining
- Impersonation / tokens
- Admin2System
- Exploits
- Privilege abuse
- Password mining
- Enable/Disable services
- Persistence
- Post-Exploitation AD
- Pivoting / tunneling
- Password cracking