This periodic table of offensive security includes tools like Metasploit, Burp Suite, Sliver, BloodHound, Mimikatz, Evilginx2, and more. Categories: Reconnaissance, Enumeration, Exploitation, Post-Exploitation, Frameworks. Ideal for red teamers, ethical hackers, pentesters, and cybersecurity professionals.