Windows Post Exploitation
infoPillage & ReconPrivilege EscalationUser PrivilegesPrivileged GroupsUser/Computer Description FieldScheduled TasksCredential HuntingCredential SniffingAlways Install ElevatedUnquoted Service PathVulnerable ServicesCookie StealingWeak Service PermissionsPermissive Registry ACLsModifiable Registry Autorun Binarykernel ExploitsVMDK, VHD and VHDX filesMalicious SCF and .Ink FileSAM & LSA AttackLSASS AttackNTDS.dit AttackRestic Backup AttackCitrix BreakoutBypassing UACPayloadsFile Transfer🟤Tools