Reconnaissance & OSINT
Passive and active information gathering. Network footprinting, asset discovery, exposure mapping.
ShodanCensysMaltegoWHOIStheHarvester
Network Security
Protocol analysis, port scanning, traffic inspection. ARP spoofing, VLAN hopping, packet crafting.
WiresharkNmapNetcattcpdumpARP analysis
Vulnerability Assessment
Web application testing, CVE analysis, exploit research. Default credential auditing, OWASP Top 10.
Burp SuiteNessusNiktoOpenVASMetasploit
Threat Intelligence
Threat actor profiling, TTPs mapping, IOC analysis. ICS/OT threat landscape research.
MITRE ATT&CKNISTVirusTotalOTXSTIX/TAXII
Linux & Systems
Intermediate Linux administration. Security hardening, service enumeration, privilege escalation concepts.
Kali LinuxBashCroniptablesSSH hardening
Secure Development
Building with security from the start. Row-level security, auth architecture, input validation, rate limiting.
OWASPJWTSupabase RLSSQL injection defenseAuth flows