HACKERS

MANIFEST

Technical Domains

๐ŸŒ

Network Security

OSI Model, TCP/IP, and Subnetting.

๐Ÿ”Œ

API Security

REST, GraphQL, and gRPC testing.

โ˜๏ธ

Cloud Security

AWS, Azure, GCP, and containers.

๐Ÿ”„

CI/CD Security

GitHub Actions, Jenkins, and supply chain.

๐Ÿ“ฑ

Mobile Security

Android and iOS security assessment.

๐Ÿ“ก

Wireless Security

WiFi attacks and WPA cracking.

๐Ÿ”Œ

IoT Security

Device firmware and protocol attacks.

๐Ÿญ

OT/ICS Security

SCADA, PLCs, and industrial systems.

๐Ÿ”“

Physical Security

Social engineering and lock picking.

๐Ÿ›

Binary Exploitation

Buffer overflows, ROP, and heap exploitation.

๐Ÿฆ 

Malware Analysis

Static/Dynamic analysis and reverse engineering.

๐Ÿฐ

AD Security

Kerberos and domain dominance.

๐Ÿ”

OSINT

Open source intelligence gathering.

๐Ÿค–

Offensive AI

AI-powered pentesting and agents.

๐ŸŽฏ

Threat Intelligence

APT groups, TTPs, and IOC analysis.

๐ŸŽฏ

Red Team Operations

Adversary simulation and covert ops.

๐Ÿ”ฌ

DFIR

Digital forensics and incident response.

โš™๏ธ

Reverse Engineering

Binary analysis and decompilation.

๐Ÿ“

Source Code Review

SAST and secure code analysis.

๐Ÿ”

Cryptography Attacks

Weak crypto and protocol flaws.

๐Ÿ“ฆ

Container Security

Docker and Kubernetes attacks.

๐Ÿš—

Automotive Security

CAN bus and vehicle hacking.

๐Ÿš

Drone Security

UAV hacking and RF attacks.

๐Ÿ”—

Blockchain Security

Smart contract and DeFi exploits.

๐Ÿ—๏ธ

Secure Architecture

Threat modeling and secure design.

Process & Standards

Essential Resources