my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept.

Check point Cyber-hub, Explore all the cyber security topics in one place and learn how to secure your business from cyber threats.

Read our expert tips and advice to help protect yourself from identity theft. Learn about data breaches, fraud, credit, and internet security from the pros at LifeLock by Norton.

The fast, easy, and affordable way to train your hacking skills. provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.

This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right place. As a beginner, these tutorials will carry you from nothing upto the mid-basics of reverse engineering, a skill that everyone within the realm of cyber-security should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.

My name is Brandon Marshall (aka Marsh) I am currently working as an Offensive Security Researcher. A majority of my time is spent developing internal Red Team tooling, reverse engineering, and exploit creation.

HackMag is an educational ecosystem where cybersecurity specialists share practical knowledge in exchange for financial rewards and recognition. Access to this knowledge significantly increases the hands-on educational level of fellow specialists and the security of computer systems throughout the world.

Free Training Tutorials & Videos for IT Courses.

Developer security training from Snyk. Snyk Learn teaches developers how to stay secure with interactive lessons exploring vulnerabilities across a variety of languages and ecosystems.

A comprehensive module-based malware development course that provides fundamental to advanced level training|

This repository is for the Offensive Security and Reverse Engineering Offensive Software Exploitation Course I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on HTID Course, but the labs were fully created by myself. I used publicly available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.

Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc.

Cybersecurity for public good. We are training the next generation of cyber leaders and safeguarding community organizations.

Deepen your security knowledge and gain a fundamental understanding of a variety of cybersecurity, identity, and compliance topics and best practices.

TIPS & GUIDANCE Ransomware incidents can severely impact business processes and leave organizations without the data they need to operate and deliver.

Study Cyber Security And Help Boost Your Job Prospects. Browse Accredited Courses From UK's Top Universities & Training Academies. Free Cyber Security Course Guide.


Explore cybersecurity courses and certificates. Many organizations have been victims of cybersecurity breaches. Cybersecurity specialists play a critical role in protecting against these attacks. Learn how to become a cybersecurity specialist with online cybersecurity courses offered through edX.

Penetration Testing and Red Teaming blogs, webcasts, and podcasts created by the pen testers and security analysts of Black Hills Information Security.

This is not a tutorial for absolute beginners on how to get started with programming assembly, or a “assembly for dummies” guide. Rather, it is a set of notes and observations I have made while on my own journey into the Microsoft x64 calling conventions that I hope will be useful to others who attempt the same path. Especially since there seems to a dearth of useful information out there regarding some of the stumbling blocks I've come across.

Read interesting articles and news on cybersecurity, application security, and data security. Explore the Wallarm Blog.


Follow your own path with handcrafted and well edited courses.

Websites contain several different types of information. Some of it is non-sensitive, for example the copy shown on the public pages. Some of it is sensitive, for example customer usernames, passwords, and banking information, or internal algorithms and private product information.

The cybersecurity upskilling platform. Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place.

Premier publication and forum for electrical engineers providing educational material, tools, industry insight, videos, podcasts and conferences.

All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more.

Welcome to Pentesting Tactics – your go-to comprehensive reference guide for conducting thorough penetration testing, tailored for both newcomers and seasoned experts in the field. Our content is carefully curated to guide you directly to the crucial insights and strategies you need, spanning a wide range of pentesting areas. From diving deep into the intricacies of service and protocol pentesting to unraveling the complexities of web vulnerabilities, we provide comprehensive coverage.

A network attack aims to access a network without permission, either to steal or alter data. This differs from endpoint, malware, and software vulnerability attacks. Learn about passive vs. active network attacks and more.

This short book is written for people who want to understand the internals of 'heap memory', particularly the implementation of glibc's 'malloc' and 'free' procedures, and also for security researchers who want to get started in the field of heap exploitation.

An intro to binary exploitation / reverse engineering course based around ctf challenges.

Learn ethical hacking skills with hands-on labs and education from cyber security experts.

Courses to learn more about blue team skills. Check out our hands-on courses to gain and sharpen investigation/detection skills.

A free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!

The largest collection of malware source code, samples, and papers on the internet.

In our digital climate cyber security is more important than ever, and the need for skilled professionals continues to increase. With the industry offering high-paying and secure jobs, there’s no better time to invest in yourself. If you have a passion for information technology and security, browse our selection of cyber security courses to start the journey to your new career as a cyber security professional. gives you books for free to study Linux.

Aura's team of experts are here to guide you on topics like identity theft, credit & finance, fraud prevention, internet safety & digital security.

This project is aimed at providing technical guides on various hacking topics. The most advanced topics are Active Directory and Web services. Other topics will be added. The ultimate goal is centralize all hacking techniques.

Your one-stop-shop to learn all about Blockchain development and Crypto Technologies.

This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Linux hacking.

This repository is for the Offensive Security and Reverse Engineering Course. I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings).