Virtual machines
Reconnaissance
Enumeration
Web applications
APIs
Cloud
Shellcoding tools
Assemblers and compilers
Disassemblers and decompilers
Steganography
Additional hardware
Social engineering
Network
Wireless
Mobile devices
Exploitation tools
Data exfiltration
Cryptanalysis
Build a virtual local testlab with tools for web application pentesting.
Labs, challenges, CTFs, and application pentesting.
Setting up Burp Suite (Kali)
Setting up ZAP (Kali)
Using firefox as proxy for Burp and Zap
HTTP proxies and traffic analysers
Vulnerability discovery tools
Target recognition
Browser extensions
Create recon scripts