Protected By Tyrant Softwares

Cybersecurity Threats and Methods & Online Privacy and Anonymity

(Any topics that are greyed out are coming soon)

Information Gathering

Doxxing IP Pulling Meta Data Digital Footprint Steganography OSINT (Open Source Intelligence) Reconnaissance Social Media Scraping WHOIS Lookup DNS Enumeration Shodan Search Google Dorking Facial Recognition Exploitation Geolocation Tracking

Malware & Exploits

Remote Access Tools Spyware Ransomware Trojans Worms Rootkits Backdoors Zero-Day Exploits Malware Adware Rogue Security Software Cryptojacking Fileless Malware Polymorphic Malware Exploit Kits Logic Bombs Bootkits Macro Malware Browser Hijackers

Network Attacks

DDoS Attack MitM Attack DNS Spoofing Session Hijacking Botnets SQL Injection Cross-Site Scripting Buffer Overflow Privilege Escalation ARP Spoofing Packet Sniffing Wireless Attacks Deauthentication Attack Evil Twin Attack VLAN Hopping NTP Amplification SNMP Exploitation Port Scanning DNS Cache Poisoning

Social Engineering

Phishing Swatting Toxxing Toxxing (discord) Man-in-the-Browser Pretexting Baiting Tailgating Quid Pro Quo Vishing Smishing Deepfake Social Engineering Impersonation Attacks Watering Hole Attacks Shoulder Surfing

Anonymity & Privacy

TOR (The Onion Router) VPNs Proxies Dark Web I2P (Invisible Internet Project) Freenet Whonix Tails OS

Advanced Threats

Advanced Persistent Threats AI Bypass Brute Force Attack Sandbox Evasion Fileless Attacks Supply Chain Attacks Watering Hole Attacks Island Hopping Living Off the Land Ransomware-as-a-Service Double Extortion AI-Powered Phishing Adversarial Machine Learning Quantum Cryptography Exploits

Exploitation Techniques

Exploit Development Shellcode Injection Return-Oriented Programming Heap Spraying Format String Exploits Race Conditions Deserialization Attacks Integer Overflow Use-After-Free Null Pointer Dereference Side-Channel Attacks Heap Overflow Time-Based Attacks Padding Oracle Attacks

Miscellaneous

Cryptography Honeypots Digital Forensics Reverse Engineering Penetration Testing Bug Bounty Programs Lock Picking RFID Cloning Bad USB Attacks USB Drop Attacks