Security Tools
Aircrack-ng
Ferret
Ghidra
Hashcat
Hydra
John the Ripper
Metasploit
MySQL
Netcat
Nikto
Nmap
OpenVAS
Pwdump
Social Engineering Toolkit
SQLMap
Wireshark
Kismet
Networking and Protocols
TCP/IP Basics
DNS
HTTP/HTTPS
Packet Analysis with Wireshark
Network Configuration & Routing
OSINT and Social Engineering
Social Media Analysis
Google Dorks
Data Scraping
People Search Techniques
Phishing Strategies
Malware Analysis
Sandbox Analysis
Dynamic Analysis
Static Analysis
Reverse Engineering
Cloud Security
AWS Security
Azure Security
GCP Security
Cloud Misconfiguration
IAM Best Practices
Pentesting and Exploit Development
Web Vulnerabilities
Buffer Overflows
Exploit Development
Red Teaming
Wireless Attacks
Forensics and Incident Response
File Analysis
Memory Forensics
Log Analysis
Network Forensics
Incident Response Procedures