Linux – Post-Exploitation

Enumeration Post-Exploitation
Linux Shell Escape Sequences
Cron
CVE

Misconfig

Programming

    Windows – Post-Exploitation

    CVE Exploits
    Enumeration Post-Exploitation
    Windows Hashes

    Misconfiguration