# Windows

- [hashes](/hacknotes/windows/hashes.md)
- [File transfers](/hacknotes/windows/file-transfers.md)
- [Credentials](/hacknotes/windows/credentials.md)
- [Maintaing access](/hacknotes/windows/maintaing-access.md)
- [AD Query](/hacknotes/windows/ad-query.md)
- [Security issues](/hacknotes/windows/security-issues.md)
- [Powerview](/hacknotes/windows/powerview.md)
- [Bloodhound](/hacknotes/windows/bloodhound.md)
- [Post Explotation](/hacknotes/windows/post-explotation.md): Post-exploitation refers to any actions taken after a session is opened. A session is an open shell from a successful exploit or bruteforce attack. A shell can be a standard shell or Meterpreter
- [Active Directory](/hacknotes/windows/active-directory.md)
- [crackmapexec](/hacknotes/windows/crackmapexec.md)
- [Priv escalation](/hacknotes/windows/priv-escalation.md)
- [hashdump not working](/hacknotes/windows/hashdump-not-working.md): you might run into this error, migrate the process to hashdump
- [http server](/hacknotes/windows/http-server.md)
- [Ms17-010](/hacknotes/windows/ms17-010.md)
