What does it take to build malware? How can we by-pass AV's and make a malware which is hard to be reversed using reverse engineering? Here you can find A to Z about the science behind "malware development" in this section of the forum.
Last but not least, wireless-hacking plays a crucial role too. Instead of naming this section as "Wireless- Hacking", we wanted to name something special for the last section of hacking/penetration testing. And here we go, we named the last section as "Wireless Kung-Fu".
Well we do agree that OSINT, anonymity & OPSEC to go hand in hand with hacking, but these terms are closely related to blue teaming and work great when it comes defending our identity or a company. So we thought of adding this section here at "Cyber-Defence and Blue Team"
Note: Privacy, anonymity and OPSEC are not the same term even if they have lot of similarities between them.