# Post Exploit

- [Compile payload](/notes/post-exploit/compile-payload.md)
- [Obfuscation](/notes/post-exploit/obfuscation.md)
- [Read VMDK files](/notes/post-exploit/read-vmdk-files.md)
- [Saved Credentials](/notes/post-exploit/saved-credentials.md)
- [Linux - Ansible AWX / Tower](/notes/post-exploit/saved-credentials/linux-ansible-awx-tower.md)
- [Linux - Dell Networker](/notes/post-exploit/saved-credentials/linux-dell-networker.md)
- [Windows - Mozilla Firefox](/notes/post-exploit/saved-credentials/windows-mozilla-firefox.md)
- [Windows - Notepad++](/notes/post-exploit/saved-credentials/windows-notepad++.md)
- [Windows - WinSCP](/notes/post-exploit/saved-credentials/windows-winscp.md)
- [Session Hijack](/notes/post-exploit/session-hijack.md)
- [Sniffing Passwords](/notes/post-exploit/sniffing-passwords.md)
- [Upgrade shell](/notes/post-exploit/upgrade-shell.md)
- [VMware](/notes/post-exploit/vmware.md)
- [Disk Encryption](/notes/post-exploit/vmware/disk-encryption.md)
- [LDAP Connection (SSO)](/notes/post-exploit/vmware/ldap-connection-sso.md)
- [Restore VCSA Postgres Database](/notes/post-exploit/vmware/restore-vcsa-postgres-database.md)
- [vCenter Forge SAML](/notes/post-exploit/vmware/vcenter-forge-saml.md)
- [Waiter Account Information](/notes/post-exploit/vmware/waiter-account-information.md)
