Summary Introduction Chapter 1 - Cheatsheets Chapter 2 - Recon & Enumeration Chapter 3 - Exploiting Vulnerabilities Chapter 4 - Windows Post-Exploitation Chapter 5 - Linux Post-Exploitation Chapter 6 - Exploit Development Chapter 7 - Cracking Chapter 8 - Reverse Engineering Chapter 9 - Miscellaneous