2 | GCKL | Get Comfortable With kali Linux |
3 | CLF | Command Line Fun |
4 | PT | Practical Tools |
5 | BS | Bash Scripting |
6 | PIG | Passive Information Gathering |
7 | AIG | Active Information Gathering |
8 | VS | Vulnerability Scanning |
9 | WAT | Web Application Attacks |
10 | BO | Introduction To Buffer |
11 | WBO | Windows Buffer Overflows |
12 | LBO | Linux Buffer Overflows |
13 | CSA | Client-Side Attacks |
14 | LPE | Locating Public Exploits |
15 | FE | Fixing Exploits |
16 | FT | File Transfers |
17 | AE | Antivirus Evasion |
18 | PX | Privilege Escalation |
19 | PA | Password Attacks |
20 | PRT | Port Redirection and Tunneling |
21 | AD | Active Directory Attacks |
22 | MF | The Metasploit Framework |
23 | PE | Powershell Empire |
24 | ATP | Assembling The Pieces: Penetration Test Breakdown |