Documentation
1️⃣Before the Exam
Local Privilege Escalation
2️⃣AntiVirus Evasion
3️⃣Bypass Defences
Client Side Code
Process Injection and Migration
Application Whitelisting
Bypassing Network Filters
Linux Post-Exploitation
Kiosk Breakouts
Windows Credentials
Lateral Movement
Microsoft SQL Attacks
Active Directory Exploitation
Combining the Pieces