# Credential Hunting

- [Files](/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/files.md)
- [History](/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/history.md)
- [Memory](/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/memory.md)
- [key-Rings](/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/key-rings.md)
