Penetration test activities, registering all the conducted actions, and following trendy TTPs that real attackers are abusing on the wild Documentation...