Cross-reference index of exploitation techniques used across all writeups. Each technique links to every machine where it appears, with brief context on how it was applied.