# Post-Exploitation

- [🔬Windows Post-Exploitation](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/win-post-exp.md)
- [🔬Windows Privilege Escalation](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/win-privesc.md)
- [🔬Windows Persistence](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/win-persistence.md)
- [🔬Linux Post-Exploitation](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/linux-post-exp.md)
- [🔬Linux Privilege Escalation](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/linux-privesc.md)
- [🔬Linux Persistence](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/linux-persistence.md)
- [🔬Cracking Hashes](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/crack-hashes.md)
- [🔬Pivoting](/kabi/ine/ejpt/hostnetwork-penetration-testing/post-exploitation/pivoting.md)
