5️⃣ 5 - Post-Exploitation Topics Linux Post-Exploitation Linux Privilege Escalation Post Exploitation / Pivoting Cheatsheets for Pentesting Windows Privilege Escalation Cheatsheet CRTP (Active Directory Notes) Cheatsheet {% hint style="danger" %} ❗ Disclaimer Never use tools and techniques on real IP addresses, hosts or networks without proper authorization! {% endhint %}