Post-Exploitation

Linux – Post-Exploitation

Enumeration Post-Exploitation
Linux privilege escalation techniques:
Cron
CVE

Windows – Post-Exploitation

CVE Exploits
Enumeration Post-Exploitation
Windows Hashes

Misconfiguration