*Evil-WinRM* PS C:\Users\daniel> whoami /all
[+] User: daniel_serbu
[+] Role: Penetration Tester & Ethical Hacker
[+] Privileges: SeDebugPrivilege (ENABLED)
*Evil-WinRM* PS C:\Users\daniel> type expertise.txt
Web Application Security | Cloud Pentesting (AWS/Azure/GCP)
Mobile Security (Android/iOS) | Active Directory | DevSecOps | OSINT
*Evil-WinRM* PS C:\Users\daniel> Get-ChildItem certifications\ | Format-Table
eWPTX - Web Application Penetration Tester eXtreme
eCPPT - Certified Professional Penetration Tester
eMAPT - Mobile Application Penetration Tester
eJPTv1 - Junior Penetration Tester v1
CAPenX - Certified AppSec Pentesting eXpert
CCPenX-AWS - Certified Cloud Pentesting eXpert - AWS
CRTSv2 - Certified Red Team Specialist v2
CELMS - Certified Enterprise Lateral Movement Specialist
CRTA - Certified Red Team Analyst
AD-RTS - Active Directory Red Team Specialist
API-RTA - API Red Team Analyst
MCRTA - Multi-Cloud Red Team Analyst
C-AI/MLPen - Certified AI/ML Pentester
CAPen - Certified AppSec Pentester
C-APIPen - Certified API Pentester
CNPen - Certified Network Pentester
CMPen-Android - Certified Mobile Pentester - Android
CAPT - Certified Android Penetration Tester
CIPT - Certified iOS Penetration Tester
*Evil-WinRM* PS C:\Users\daniel> .\pivot_network.ps1
[+] Let's hunt for vulnerabilities...