Below is the list of items:
You’ve found username(s) and need to know what you can do with them.
You’ve found password(s) and need to know what you can do with them.
You don’t have any usernames or passwords and need to know what you can still do.
You’ve found hash(es) and need to know what you can do with them.
You have a shell on the target host and need to know what you can do.
You have a binary/executable and need to know what you can do.