Key resources for vulnerability research — CVE databases, exploit archives, and advisory feeds for identifying and understanding known vulnerabilities.
Advanced search operators for Google and other engines — finding exposed files, login pages, directories, and sensitive information indexed by search engines.
Linux and Windows shells — identifying what shell you're in, differences between common shells, and upgrading limited shells to fully interactive ones.