- Recoinnassance
- Enumeration/Scanning
- Web applications
- Client Side Attacks
- SQL
- Password Attacks
- API
- SSTI
- Create user names from full names
- AWS
- Steganography
- Encryption
- Exploitation
- Active Directory
- Privilege escalation
- Exfiltration
- Tunneling
- Post-explotation
- Buffer overflows
- Android
- Kubernetes
- Red Teaming
- APTs