# Access Token Manipulation

## Create Process with Token

## Make and Impersonate Token

## Parent PID Spoofing

## SID-History Injection

## Token Impersonation/Theft
