API attack playbooks¶
Full attack chains from surface discovery through to exploitation. Each playbook covers one API type from the initial reconnaissance through to a documented finding, connecting the individual runbooks into an operational sequence.