# Windows

- [Shellcode and PE loader](/windows/shellcode_and_pe_loader.md)
- [Bypass PowerShell ConstrainedLanguageMode](/windows/bypass_ps_constrainedlanguagemode.md)
- [Bypass AppLocker](/windows/bypass_applocker.md)
- [Local privilege escalation](/windows/local_privilege_escalation.md)
- [Post exploitation](/windows/post_exploitation.md)
- [Credentials dumping](/windows/post_exploitation/credentials_dumping.md)
- [Defense evasion](/windows/post_exploitation/defense_evasion.md)
- [Local persistence](/windows/post_exploitation/local_persistence.md)
- [Lateral movements](/windows/lateral_movements.md)
- [Local credentials re-use](/windows/lateral_movements/local_credentials_reuse.md)
- [Over SMB](/windows/lateral_movements/over_smb.md)
- [Over WinRM](/windows/lateral_movements/over_winrm.md)
- [Over WMI](/windows/lateral_movements/over_wmi.md)
- [Over DCOM](/windows/lateral_movements/over_dcom.md)
- [CrackMapExec](/windows/lateral_movements/crackmapexec.md)
