AnalysisngrevDeobfuscated BurpSuite Pro 2.1RedressPA-Toolkit | Pentester Academy Wireshark ToolkitVoIPSharkGHIDRACutter - Radare2 Gui
ForensicsDeobfuscated BurpSuite Pro 2.1RedressPyREBoxGHIDRACutter - Radare2 GuiCracking HawkEye Keylogger Reborn
Information-gatheringACT | Semi-Automated Cyber Threat IntelligenceAIL FrameworkOsmedeusRedELKBloodHound
ListAndroid Security ListRed Teaming/Adversary Simulation ToolkitActive Directory Kill Chain Attack and Defense
PentestingLKWAAppSpiderServer Side Template InjectionezXSSLinux Smart EnumerationAndroid Security ListRed Teaming/Adversary Simulation Toolkit
Privilege EscalationUAC Bypass in Windows 10 Store BinaryBypassing UAC using App PathsAnother sdclt UAC bypassLinux Privilege EscalationWindows Privilege Escalation
command-and-controlFaction C2 FrameworkSliverFudgeC2Telegram Csharp C2GhostTunnelgoDoHKoadic C3Covenant