This site contains a list of the different Tool-List pages.
Enumeration – Usually done at the beginning to discover a network, targets and services.
Exploitation – Tools and tricks on how to exploit vulnerable services and applications.
Post-Exploitation – Everything needed after getting inside the target network. Lateral movement, privilege escalation and network pivoting.
Miscellaneous – Everything else that might be useful.
Phishing – Collection of different Phishing-Methods