Introduction

What?

Notes on tools used for exploitation and escalation and evading security controls, and experimenting with new tools.

Why?

To enable learning and finding ways to more quickly exploit vulnerabilities or reinvent attacks.

How?