Nmap

Footprinting

Information Gathering (2)

Vulnerability Assessment

File Transfers (1)

Shells and Payloads (1)

Metaslopoit (1)

Password Attacks (1)

Attacking Common Services (1)

Pivoting, Tunneling, and Port Forwarding (1)

AD Basics, Enumeration, Att&cks

Web Requests (2)

FFUF

Hydra (1)

SQLi Basics (2)

SQLMap

XSS (2)

File Inclusion & Path Traversal (2)

File Upload (2)

Command Injection (2)