MacOS

Check API Keys

Cobalt Strike modifications

JAMF

Phishing

Payloads

Infrastructure Setup

External Enumeration

Initial access

Privilege escalation

Host Situational Awareness

Domain Situational Awareness

Evasion

Credential Access

Discovery

Lateral Movement

Exploitation / Abuse

Persistence

Passwords cracking

Exfiltration