End-to-end transfer scenarios

Exfiltration scenarios that combine channel selection, staging, transfer, verification, and cleanup into a single operational flow. Each playbook is designed to complete the transfer without generating alerts in the target’s security tooling.