- 📓 Practical Ethical Hacker Notes
- 📚 Main Contents
- 2 - Footprinting & Recon
- 3 - Scanning Networks
- 4 - Enumeration
- 5 - Vulnerability Analysis
- 6 - System Hacking
- 7 - Malware
- 8 - Sniffing
- 10 - DoS
- 11 - Session Hijacking
- 13 - Hacking Web Servers
- 14 - Hacking Web Apps
- 15 - SQL Injection
- 16 - Hacking Wireless
- 17 - Hacking Mobile
- 18 - IoT and OT Hacking
- 19 - Cloud Computing
- 20 - Cryptography
- 👨🎓 Study Walkthrough
- Tools 🛠️
- 🤖 Adb tool
- 🔐 BCTextEncoder
- 🟧 Burp Suite
- 👨💻 Cewl
- 📁 Crunch
- 🗃 Dirb
- 🐧 Enum4linux
- 🔗 Gobuster
- 🔓 Hashcalc
- 😺 Hashcat
- 👉 Hping3
- 🐉 Hydra
- 🥷 John the Ripper
- Ⓜ Metasploit
- 5⃣ Md5 Calculator
- 👽 Nikto
- 👁 Nmap
- 🖼 Openstego
- 🎨 QuickStego
- 🌈 RainbowCrack
- ↗ Responder LLMNR
- 🕷 Searchsploit
- ⛄ Snow
- 🌀 Stego
- 💉 SQLMap
- ⚙ Steghide
- ⚗ Stegimage
- 🔑 Veracrypt
- 🦈 Wireshark or Tcpdump
- 🔍 WPScan
- ⚡ Zap
- 📚 Main Contents