Security Tools

Aircrack-ng
Ferret
Ghidra
Hashcat
Hydra
John the Ripper
Metasploit
MySQL
Netcat
Nikto
Nmap
OpenVAS
Pwdump
Social Engineering Toolkit
SQLMap
Wireshark
Kismet

Networking and Protocols

TCP/IP Basics
DNS
HTTP/HTTPS
Packet Analysis with Wireshark
Network Configuration & Routing

OSINT and Social Engineering

Social Media Analysis
Google Dorks
Data Scraping
People Search Techniques
Phishing Strategies

Malware Analysis

Sandbox Analysis
Dynamic Analysis
Static Analysis
Reverse Engineering

Cloud Security

AWS Security
Azure Security
GCP Security
Cloud Misconfiguration
IAM Best Practices

Pentesting and Exploit Development

Web Vulnerabilities
Buffer Overflows
Exploit Development
Red Teaming
Wireless Attacks

Forensics and Incident Response

File Analysis
Memory Forensics
Log Analysis
Network Forensics
Incident Response Procedures