<aside> 💡 Hacking Resources

</aside>

<aside> 💡 The Kill Chain (F2T2EA): Adversary Route → Reconnaissance(enumeration). Weaponize. Delivery. Exploitation. Installation. Command and Control(C2). Actions and Objectives

</aside>


Untitled

Cyberchef

VirusTotal

Base64Guru

ThreatBook CTI

URLScan

Hybrid Analysis

Online Python

OSQuery

Wireshark

MITRE ATT&CK

theHarvester

Hunter

OSINT Framework

Metasploit