1. Kali linux terminal
2. Commands- I
3. Commands- II
4. Commands- III
5. Commands- IV
6. Commands- V
7. Commands- VI
8. Commands- VII
9. Commands- VIII
10. Commands- IX
11. Commands- X
12. Commands- XI
13. Permissions in kali- I
14. Permissions in kali- II
15. Shortcuts
16. Anonymity
17. Proxy- Theory
18. Proxy- Practical
19. VPN- I
20. VPN- II
21. TOR- I
22. TOR- II
23. TOR- III
24. Proxychains
25. Alter IP
26. Alter MAC
27. MACchanger
28. Footprinting
29. DNS Enumeration
30. DNSenum
31. Bruteforce
32. Trace DNS
33. Nmap- I
34. Nmap- II
35. Nmap- III
36. Searchexploit
37. Website Footprinting
38. Vulnerability Analysis
39. Live Attack
40. RedHawk
41. Security Audit
42. Database Assessment
43. JSQL
44. SQLsus
45. Password Attack
46. Plain Text to Hash
47. Password Cracking
48. Find my Hash
49. Custom Wordlist
50. Crunch
51. Cracking Password Offline
52. Hash Generator
53. Password Protected Zip
54. THC Hydra
55. Medusa