Table of contents

Shells

Linux/Unix

Windows

Mobile Apps Pentesting

Pentesting

Pentesting Web

Physical attacks

Reversing

Exploiting

Forensics

Crypto

BACKDOORS

Stego

MISC

TODO