Network Scanning
Host discovery, service detection, and mapping workflows.
Web Testing
Interception, request manipulation, and application testing.
Exploitation Frameworks
Framework-driven exploitation, payloads, and session handling.
Cyber arsenal — tool references, cheatsheets, and usage guides.