🐻
jotter's den
Ctrl
k
Copy
Cloud
Azure/O365
Recon
Initial Access, Tokens, and MFA
Enumeration
Post-Exploitation
IAM and Resource Attacks
Previous
Other Targets
Next
Recon