<aside> 💡 Hacking Resources
</aside>
<aside> 💡 The Kill Chain (F2T2EA): Adversary Route → Reconnaissance(enumeration). Weaponize. Delivery. Exploitation. Installation. Command and Control(C2). Actions and Objectives
Untitled
Cyberchef
VirusTotal
Base64Guru
ThreatBook CTI
URLScan
Hybrid Analysis
Online Python
OSQuery
Wireshark
MITRE ATT&CK
theHarvester
Hunter
OSINT Framework
Metasploit