Red team
cloud active-directory applications enumeration apis exploitation exfiltration information-gathering escalation evasions initial-access post-compromise
-
Updated
Apr 28, 2025 - JavaScript