This repository may contain adversary emulation procedures and defensive validation steps intended for controlled, authorized environments only.
Do not use offensive tooling, scanning, or exploitation techniques against systems you do not own or have explicit authorization to test.
If you discover an issue in this repository, open a GitHub issue with:
- a clear description
- reproduction steps (if applicable)
- the expected vs observed outcome