Defense Evasion Techniques
Exploitation Frameworks
Network Analysis Arsenal
Post-Exploitation Tools
Reconnaissance Tools
Vulnerability Assessment Tools