MacOS
Check API Keys
Cobalt Strike modifications
JAMF
Phishing
Payloads
Infrastructure Setup
External Enumeration
Initial access
Privilege escalation
Host Situational Awareness
Domain Situational Awareness
Evasion
Credential Access
Discovery
Lateral Movement
Exploitation / Abuse
Persistence
Passwords cracking
Exfiltration