Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation