From access to staged data¶
End-to-end collection scenarios combining multiple techniques into a coherent operation. Each playbook represents a realistic attack path from initial foothold through enumeration to data staged and ready for exfiltration.