Reconnaissance (Use Cases)
*Whois, Nslookup, Theharvester, Shodan, Recon-NG, Censys, Aircrack-NG, Kismet, WiFite(2), Wireshark, Hing, SET, Nmap, Metasploit framework
Enumeration (Use Cases)
*Nslookup, wireshark, Hping, nmap
Vulnerability Scanning (Use Cases)
Credential Attacks (Use Cases)
Persistence (Use Cases)
Configuration Compliance (Use Cases)
Evasion (Use Cases)
*proxychains, SET, metasploit, route
Decompilation (Use Cases)
*IDA, hopper, immunity debugger, APK studio, APKX
Forensics (Use Cases)
Debugging
*Ollydbg, Immunity Debugger, GDB, WinDBG, IDA Pro, APK Studio, APKX
Software Assurance (Use Cases)