# 4. Exploitation

- [Public exploits](/4.-exploitation/public-exploits.md)
- [Web application attacks](/4.-exploitation/web-application-attacks.md)
- [Command injection](/4.-exploitation/web-application-attacks/command-injection.md)
- [Cross site scripting](/4.-exploitation/web-application-attacks/cross-site-scripting.md)
- [Directory traversal](/4.-exploitation/web-application-attacks/directory-traversal.md)
- [File inclusion](/4.-exploitation/web-application-attacks/file-inclusion.md)
- [SQL injection](/4.-exploitation/web-application-attacks/sql-injection.md)
- [Password attacks](/4.-exploitation/password-attacks.md)
- [Buffer overflows](/4.-exploitation/buffer-overflows.md)
- [Active Directory](/4.-exploitation/active-directory.md)
- [Metasploit](/4.-exploitation/metasploit.md)
