-
Post Exploitation - Transferring Files To Windows Targets
-
Windows Post Exploitation - Local Enumeration
-
Active Directory Enumeration With PowerView
-
Active Directory Enumeration With BloodHound
-
Windows Post Exploitation - Dumping Hashes With Mimikatz
-
Windows Post Exploitation - Persistence With Metasploit
-
Windows Enumeration With winPEAS
-
Windows Post Exploitation - Dumping & Cracking NTLM Hashes