Pivoting
https://artkond.com/2017/03/23/pivoting-guide/
Cryptography
Steganography
Forensic
Network
Binary exploitation
web https://badsite.io/ https://twitter.com/Alra3ees/status/971491404483571712 https://mothereff.in/
https://docs.google.com/document/d/101EsKlu41ICdeE7mEv189SS8wMtcdXfRtua0ClYjP1M/edithttps://www.malwaretech.com/beginner-malware-reversing-challenges https://www.begin.re/
Reverse Engineering https://crackmes.one/
https://medium.com/@hakluke/haklukes-guide-to-hacking-without-metasploit-1bbbe3d14f90
https://curtbraz.blogspot.com/2018/08/bypassing-next-gen-av-during-pentest.html