The lodge
The lodge was still and silent; she made no sound, and within the room, as without in the forest, was the blackness of storm. Only now and then a flash of lightning showed a woman’s silhouette at the desk … developing and building disposable environments.

Virtual machines
Drives
Reconnaissance
- Introduction
- Recon-ng
- Using whois
- Passive DNS recon with Shodan
- Tools for DNS zone transfers
- Researching certificates
- Finding ASN numbers
- Listing subdomains
- Tracing routes
- Advanced searching
- Google dorking
- Searching by image
- People search
- Website footprinting
- Custom Word List Generator (CeWL)
- DirBuster
- Tools for Bluetooth device discovery
- Discover vulnerabilities
Enumeration
Web applications
Cloud
Static analysis
Disassemblers
Debuggers
Decompilers
Program editing tools
Analysis automation programming
Exploitation tools
Exploit development
Assemblers
Compilers
Steganography
Social engineering
Additional hardware
Network
Mobile devices
Data exfiltration
Cryptanalysis
Threat analysis
Network traffic analysis
Endpoint detection and response
Security information and event management
Digital forensics and incident response
- Introduction
- First responder toolkit
- Audit trail tools
- SquashFS and fsfimage
- Imaging tools
- Carving tools
- Commercial tools
- RedLine
- Guymager
- Autopsy
- Kroll Artifact Parser and Extractor (KAPE)
- Volatility
- Velociraptor
- TheHive project
- Libewf and ewf-tools
- BMC-tools
- Google container tools
- libbde-utils
- Linux artifact analysis tools
Phishing analysis
Malware analysis
