Offensive Security¶ What you will find here: Reconnaissance Vulnerability Assessment Exploitation & Gaining Access Post-Exploitation & Lateral Movement Wireless Security