This site contains a list of the different Tool-List pages.

Enumeration – Usually done at the beginning to discover a network, targets and services.

Exploitation – Tools and tricks on how to exploit vulnerable services and applications.

Post-Exploitation – Everything needed after getting inside the target network. Lateral movement, privilege escalation and network pivoting.

Miscellaneous – Everything else that might be useful.

Phishing – Collection of different Phishing-Methods