Virtual machines
Drives
Reconnaissance
Enumeration
Web applications
APIs
Cloud
Static analysis
Disassemblers
Debuggers
Decompilers
Program editing tools
Analysis automation programming
Exploitation tools
Exploit development
Assemblers
Compilers
Steganography
Social engineering
Additional hardware
Network
Wireless
Mobile tools
Data exfiltration
Cryptanalysis
Security information and event management
Threat intelligence
Threat hunting
Vulnerability management
Network traffic analysis
Endpoint detection and response
Digital forensics and incident response
Phishing analysis
Malware analysis
Active defence
Notes on tools used for reconnaissance, and experimenting with new tools.
Gathering useful information about a target.
Recon-ng
Using whois
Passive DNS recon with Shodan
Tools for DNS zone transfers
Researching certificates
Finding ASN numbers
Listing subdomains
Tracing routes
Advanced searching
Google dorking
Searching by image
People search
Website footprinting
Custom Word List Generator (CeWL)
DirBuster
Tools for Bluetooth device discovery
Discover vulnerabilities