Introduction

What?

Notes on tools used for exploitation and escalation and evading security controls, and experimenting with new tools.

Why?

To enable learning and finding ways to more quickly adapt or make shellcode.

How?