MOD_01
🐧
Linux & Terminal Mastery
Deep dive into Linux OS, filesystem, permissions, shell scripting, and terminal power tools that every hacker relies on.
FOUNDATION
MOD_02
📡
Advanced Wireless Exploitation
WPA/WPA2 cracking, evil twin attacks, deauth flooding, handshake capture, PMKID attacks, and rogue AP deployment.
WIRELESS
MOD_03
🕸️
Network Scanning with NMAP
Host discovery, port scanning, OS fingerprinting, service enumeration, NSE scripting, and stealth scan techniques.
RECON
MOD_04
🔍
OSINT Operations
Open-source intelligence gathering — email harvesting, social media recon, Maltego, Shodan, Google dorks, and passive footprinting.
INTELLIGENCE
MOD_05
💣
Metasploit Framework
Full Metasploit mastery — payloads, exploits, post-exploitation, Meterpreter sessions, pivoting, and custom module development.
EXPLOITATION
MOD_06
🌐
Web Application Attacks
OWASP Top 10 — SQL injection, XSS, CSRF, LFI/RFI, SSRF, broken auth, insecure deserialization, and API vulnerabilities.
WEB
MOD_07
🦠
Malware Analysis
Static & dynamic malware analysis, sandbox setup, reverse engineering basics, behavioral analysis, and IOC extraction.
ANALYSIS
MOD_08
🔐
Password Auditing & Cracking
Hashcat, John the Ripper, rainbow tables, rule-based attacks, credential stuffing, and dictionary attack optimization.
AUTH BYPASS
MOD_09
🛡️
Bypassing AV & Firewalls
Payload obfuscation, AV evasion techniques, IDS/IPS bypass, living-off-the-land attacks, and fileless malware concepts.
EVASION
MOD_10
🔬
Traffic Analysis
Wireshark, tcpdump, network forensics, protocol dissection, detecting anomalies, and MitM traffic interception.
NETWORK
MOD_11
🗂️
Log Forensics & Analysis
Linux & Windows log analysis, SIEM basics, event correlation, intrusion detection through logs, and log tampering techniques.
FORENSICS
MOD_12
🏴☠️
Red Team Operations
Full kill chain methodology — recon, weaponization, delivery, exploitation, persistence, lateral movement, and exfiltration.
RED TEAM
MOD_13
🧬
Exploit Development Basics
Buffer overflows, SEH exploits, ROP chains, shellcode writing, and understanding memory corruption vulnerabilities.
ADVANCED
MOD_14
🕵️
Social Engineering & Phishing
Human hacking — spear phishing, pretexting, credential harvesting, SET framework, and building convincing fake portals.
HUMAN HACK
MOD_15
☁️
Cloud Security Attacks
AWS/Azure/GCP misconfigurations, S3 bucket exploitation, IAM privilege escalation, and cloud metadata attacks.
CLOUD
MOD_16
📱
Mobile App Pentesting
Android APK reversing, SSL pinning bypass, insecure storage, Frida dynamic instrumentation, and mobile OWASP Top 10.
MOBILE
MOD_17
🐍
Python for Hackers
Scripting custom tools — port scanners, keyloggers, packet sniffers, automation scripts, and exploit PoC development.
SCRIPTING
MOD_18
🏁
CTF & Lab Challenges
Hands-on capture-the-flag challenges — HackTheBox, TryHackMe walkthroughs, and custom lab environments.
PRACTICE