Active Directory

Attack simulation

Decryption

Domain Admin

Dynamic analysis

Exploitation

Google advanced search operators

ICT Security

Incognito

Information gathering

IoT

Java vulnerability

John The Ripper

Maltego

Malware

Metasploit

Metasploitable 2

NFS

NSE

Netdiscover

Network discovery

Network packet analysis

Nmap

OSINT

Office macro

Password cracking

Penetration testing

Port scanning

Post-exploitation

Privilege escalation

RPC

Ransomware

Recon-ng

Reconnaissance

Reverse engineering

Sandbox

Shodan

TCP 3-way handshake

TCP scan

Token impersonation

UDP scan

Vulnerability analysis

Wireshark

theHarvester