The lodge
The lodge was still and silent; she made no sound, and within the room, as without in the forest, was the blackness of storm. Only now and then a flash of lightning showed a woman’s silhouette at the desk … developing and building disposable environments.

Virtual machines
Drives
Reconnaissance
- Introduction
- Recon-ng
- Using whois
- Passive DNS recon with Shodan
- Tools for DNS zone transfers
- Researching certificates
- Finding ASN numbers
- Listing subdomains
- Tracing routes
- Advanced searching
- Google dorking
- Searching by image
- People search
- Website footprinting
- Custom Word List Generator (CeWL)
- DirBuster
- Tools for Bluetooth device discovery
- Discover vulnerabilities
Enumeration
Web applications
Cloud
Static analysis
Disassemblers
Debuggers
Decompilers
Program editing tools
Analysis automation programming
Exploitation tools
Exploit development
Assemblers
Compilers
Steganography
Social engineering
Additional hardware
Network
Mobile tools
Data exfiltration
Cryptanalysis
Security information and event management
Threat intelligence
Threat hunting
Network traffic analysis
Endpoint detection and response
Digital forensics and incident response
- Introduction
- First responder toolkit
- Audit trail tools
- SquashFS and fsfimage
- Imaging tools
- Carving tools
- Guymager
- Commercial tools
- RedLine
- Autopsy on Kali
- Autopsy on Windows
- Kroll Artifact Parser and Extractor (KAPE)
- Volatility
- Velociraptor
- TheHIVE
- Libewf and ewf-tools
- BMC-tools
- libbde-utils
- Linux artifact analysis tools
- Google container tools
- BusyBox
Phishing analysis
Malware analysis
Active defence
