// select platform
Pentesting Knowledge Base
In-depth attack chain documentation paired with hands-on command references for each phase.
🏴
Active Directory
AD pentesting, Kerberos, LDAP, lateral movement
soon
🪟
Windows
Local privesc, credential dumping, AV evasion
soon
🐧
Linux
SUID abuse, cron jobs, kernel exploits