WEB
Web Application Security
Full-stack web exploitation including OWASP Top 10, authentication bypass, and server-side template injection.
SQL Injection XSS SSRF RCE
NET
Network Penetration Testing
Internal and external network penetration with advanced pivoting, tunneling, and service exploitation.
Port Scanning Lateral Movement Pivoting
PWN
Binary Exploitation (Pwn)
Stack and heap exploitation, return-oriented programming, and bypass of modern mitigations like ASLR and DEP.
Buffer Overflow Heap Exploit ROP Chains
REV
Reverse Engineering
Static and dynamic binary analysis, firmware extraction, and proprietary protocol reverse engineering.
Disassembly Decompilation Protocol RE
CRY
Cryptography
Cryptanalysis of symmetric and asymmetric ciphers, padding oracle attacks, and implementation flaws.
Cipher Attacks Key Recovery Hash Cracking
SOC
Social Engineering
Advanced social engineering campaigns, spear-phishing payload delivery, and human-factor exploitation.
Phishing Pretexting Vishing
WIR
Wireless Security
WPA/WPA2/WPA3 attacks, Bluetooth Low Energy exploitation, and software-defined radio analysis.
WiFi Attacks Bluetooth RF Hacking
CLD
Cloud Security
Cloud privilege escalation, IAM policy abuse, container escape, and serverless function exploitation.
AWS Azure GCP Misconfig
MOB
Mobile Application Security
Android and iOS application testing, certificate pinning bypass, and mobile API security assessment.
Android iOS Mobile APIs
MAL
Malware Analysis
Malware reverse engineering, sandbox analysis, C2 protocol identification, and threat intelligence.
Static Analysis Dynamic Analysis Behavioral
PRIV
Privilege Escalation
Local and domain privilege escalation chains, kernel exploits, and misconfiguration abuse.
Linux PrivEsc Windows PrivEsc AD Escalation
OSI
OSINT & Recon
Open-source intelligence gathering, attack surface mapping, and automated reconnaissance workflows.
Footprinting Enumeration Dorking
API
API Security
API endpoint discovery, broken access control, mass assignment, and rate limiting bypass techniques.
REST GraphQL Auth Bypass
IOT
IoT & Embedded
Firmware extraction and analysis, JTAG/UART exploitation, and industrial control system security.
Firmware Hardware SCADA/ICS
AD
Active Directory Attacks
Active Directory attack chains, Kerberos abuse, delegation attacks, and domain dominance techniques.
Kerberoasting Pass-the-Hash DCSync
EVD
Evasion & Stealth
Antivirus and EDR evasion, payload obfuscation, AMSI bypass, and living-off-the-land techniques.
AV Bypass EDR Evasion Obfuscation