Web application attack playbooks

Full attack chains from surface discovery through to exploitation. Each playbook connects the individual runbooks into an operational sequence for a specific engagement type.