Skip to main content
The Playbook defines the operational methodology used throughout all engagements. Each phase builds on the previous, creating a disciplined and repeatable attack flow.

Recon

Passive and active reconnaissance techniques to map the target surface.

Enumeration

Deep-dive enumeration to identify entry points and misconfigurations.

Exploitation

Gaining initial access by exploiting discovered vulnerabilities.

Post-Exploitation

Actions on objectives - persistence, pivoting, and exfiltration.