Read interesting articles and news on cybersecurity, application security, and data security. Explore the Wallarm Blog.
Deepen your security knowledge and gain a fundamental understanding of a variety of cybersecurity, identity, and compliance topics and best practices.
This repository is for the Offensive Security and Reverse Engineering Offensive Software Exploitation Course I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on HTID Course, but the labs were fully created by myself. I used publicly available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.
A free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!
HackMag is an educational ecosystem where cybersecurity specialists share practical knowledge in exchange for financial rewards and recognition. Access to this knowledge significantly increases the hands-on educational level of fellow specialists and the security of computer systems throughout the world.
Check point Cyber-hub, Explore all the cyber security topics in one place and learn how to secure your business from cyber threats.
Welcome to Pentesting Tactics – your go-to comprehensive reference guide for conducting thorough penetration testing, tailored for both newcomers and seasoned experts in the field. Our content is carefully curated to guide you directly to the crucial insights and strategies you need, spanning a wide range of pentesting areas. From diving deep into the intricacies of service and protocol pentesting to unraveling the complexities of web vulnerabilities, we provide comprehensive coverage.
This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right place. As a beginner, these tutorials will carry you from nothing upto the mid-basics of reverse engineering, a skill that everyone within the realm of cyber-security should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.
Your go-to source for expert red team tips and tricks. Elevate your cybersecurity game with our insightful content.
Courses to learn more about blue team skills. Check out our hands-on courses to gain and sharpen investigation/detection skills.
Websites contain several different types of information. Some of it is non-sensitive, for example the copy shown on the public pages. Some of it is sensitive, for example customer usernames, passwords, and banking information, or internal algorithms and private product information.
In our digital climate cyber security is more important than ever, and the need for skilled professionals continues to increase. With the industry offering high-paying and secure jobs, there’s no better time to invest in yourself. If you have a passion for information technology and security, browse our selection of cyber security courses to start the journey to your new career as a cyber security professional.
Penetration Testing and Red Teaming blogs, webcasts, and podcasts created by the pen testers and security analysts of Black Hills Information Security.
Read our expert tips and advice to help protect yourself from identity theft. Learn about data breaches, fraud, credit, and internet security from the pros at LifeLock by Norton.
This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Linux hacking.
Learn ethical hacking skills with hands-on labs and education from cyber security experts.
Follow the adventures of Certificat as she explains why HTTPS is crucial for the future of the internet and how it all works together in a comic.
This short book is written for people who want to understand the internals of 'heap memory', particularly the implementation of glibc's 'malloc' and 'free' procedures, and also for security researchers who want to get started in the field of heap exploitation.
TIPS & GUIDANCE Ransomware incidents can severely impact business processes and leave organizations without the data they need to operate and deliver.
This repository is for the Offensive Security and Reverse Engineering Course. I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings).
Premier publication and forum for electrical engineers providing educational material, tools, industry insight, videos, podcasts and conferences.
Your one-stop-shop to learn all about Blockchain development and Crypto Technologies.
A one stop shop for AI security education. Use Nightfall's growing library to learn new concepts evolving in today's world of artificial intelligence or refresh yourself on AI security's core topics.
Course materials for Modern Binary Exploitation by RPISEC.
A comprehensive module-based malware development course that provides fundamental to advanced level training|
Cybersecurity for public good. We are training the next generation of cyber leaders and safeguarding community organizations.
Study Cyber Security And Help Boost Your Job Prospects. Browse Accredited Courses From UK's Top Universities & Training Academies. Free Cyber Security Course Guide.
An intro to binary exploitation / reverse engineering course based around ctf challenges.
Learn OSINT for free by subscribing to our newsletter. Discover the best Open-Source Intelligence (OSINT) tools, techniques, and valuable resources.
NetworkLessons.com offers a range of Networking courses, including Cisco CCNA, CCNP and CCIE Routing & Switching. You find an overview of all courses below.
Interactive Kubernetes Security Learning Playground.
Explore cybersecurity courses and certificates. Many organizations have been victims of cybersecurity breaches. Cybersecurity specialists play a critical role in protecting against these attacks. Learn how to become a cybersecurity specialist with online cybersecurity courses offered through edX.
exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.
This project is aimed at providing technical guides on various hacking topics. The most advanced topics are Active Directory and Web services. Other topics will be added. The ultimate goal is centralize all hacking techniques.
Welcome to the IAM and Cybersecurity Learning Hub, where we provide information about topics that work together to provide a unified identity security strategy, securing your users, data and applications from cyberattacks. We update this area regularly with new content, so be sure to check in regularly.
The cybersecurity upskilling platform. Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place.
Aura's team of experts are here to guide you on topics like identity theft, credit & finance, fraud prevention, internet safety & digital security.
Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc.
A network attack aims to access a network without permission, either to steal or alter data. This differs from endpoint, malware, and software vulnerability attacks. Learn about passive vs. active network attacks and more.
Developer security training from Snyk. Snyk Learn teaches developers how to stay secure with interactive lessons exploring vulnerabilities across a variety of languages and ecosystems.
All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more.
The largest collection of malware source code, samples, and papers on the internet.
My name is Brandon Marshall (aka Marsh) I am currently working as an Offensive Security Researcher. A majority of my time is spent developing internal Red Team tooling, reverse engineering, and exploit creation.
In the contemporary cybersecurity landscape, Security Operations Centers find themselves besieged by an overwhelming number of cyber threats, escalating in both frequency and complexity, leaving traditional...
This is not a tutorial for absolute beginners on how to get started with programming assembly, or a “assembly for dummies” guide. Rather, it is a set of notes and observations I have made while on my own journey into the Microsoft x64 calling conventions that I hope will be useful to others who attempt the same path. Especially since there seems to a dearth of useful information out there regarding some of the stumbling blocks I've come across.