Nmap
Footprinting
Information Gathering (2)
Vulnerability Assessment
File Transfers (1)
Shells and Payloads (1)
Metaslopoit (1)
Password Attacks (1)
Attacking Common Services (1)
Pivoting, Tunneling, and Port Forwarding (1)
AD Basics, Enumeration, Att&cks
Web Requests (2)
FFUF
Hydra (1)
SQLi Basics (2)
SQLMap
XSS (2)
File Inclusion & Path Traversal (2)
File Upload (2)
Command Injection (2)