π Kill ChainNotes covering the various stages of an attack (organized kinda like the Cyber Kill Chain). π οΈ ToolsNotes detailing the tools I've encountered (sorted in alphabetical order).πΊοΈ WSTG Mind MapNotes on web vulnerabilities in the form of a Mind Map (based on OWASP's WSTG).