https://stormsecurity.wordpress.com/2012/06/05/manual-pentesting-cheatsheet-windows/
https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit
http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf
https://www.scribd.com/document/100182787/Windows-Post-Exploitation-Command-List
https://github.com/mubix/post-exploitation
https://github.com/emilyanncr/Windows-Post-Exploitation
https://backdoorshell.gitbooks.io/oscp-useful-links/content/windows-post-exploitation.html
https://hackertor.com/2018/01/28/manual-post-exploitation-on-windows-pc-system-command/
http://www.hackingarticles.in/manual-post-exploitation-windows-pc-system-command/
https://www.windows-commandline.com/add-user-to-group-from-command-line/
https://4sysops.com/archives/forgot-the-administrator-password-the-sticky-keys-trick/
https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/