Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Advanced Azure Attacks - Advanced
Azure is widely used by enterprises for a variety of purposes. There is a huge offering of services across various categories in Azure - Identity, Compute, Networking, Storage, Databases, Analytics, Security and many more.
Azure, like any other cloud, changes...
Course Overview
Welcome to the arcX Cyber Threat Intelligence 101 course - an essential introduction to the world of cyber threat intelligence (CTI). Discover the basics and gain a new appreciation for this ever-growing area within cyber security.
This short course serves as a sneak peek into...
FOR608: Enterprise-Class Incident Response & Threat Hunting
FOR608: Enterprise-Class Incident Response & Threat Hunting focuses on identifying and responding to incidents too large to focus on individual machines. By using example tools built to operate at enterprise-class scale, students learn...
Certified Evasion Techniques Professional (CETP)
In recent years, Endpoint countermeasures have improved rapid in their detection and response capabilities. It now takes a lot of investment by red teams to develop tradecraft and techniques that can reliably evade or bypass these...
PEN-300: Advanced Evasion Techniques and Breaching Defenses
Building on the skills acquired in PEN-200, OffSec’s PEN-300 course explores advanced penetration testing techniques against hardened targets. Learners gain hands-on experience bypassing security defenses and crafting custom exploits...
Prerequisites
12 months of IT security experience
12 months of Networking Experience
Description
This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.
The vendor-neutral Certified Penetration Testing...
Course Overview
Advanced Web Hacking is designed to take your web penetration testing skills to the next level. This course dives deep into advanced topics, exploring edge-case vulnerabilities, sophisticated attacks, and complex scenarios faced in modern web applications. Each module will offer...
SEC450 provides students with technical knowledge and key concepts essential for security operation center (SOC) analysts and new cyber defense team members. By providing a detailed explanation of the mission and mindset of a modern cyber defense operation, this course will jumpstart and empower...
Offensive Development w Greg Hatcher & John Stigerwalt
In the Intro to Offensive Tooling class, you will learn about many of the tools used by attackers to identify vulnerabilities and exploit them. This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit...
SEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise
This course is designed to help students establish and maintain a holistic and layered approach to security, while taking them on a journey towards a realistic 'less trust' implementation...
🛠️ Resource: Top 24 Tools for Threat Intelligence, OSINT, and Attack Surface Mapping
Hey everyone,
I’ve compiled a list of 24 valuable online tools to the HTDark Community that can aid in reconnaissance, threat intelligence gathering, attack surface mapping, and vulnerability analysis. Whether...
Threat Hunting: Detecting Attacks in Real-Time with Splunk and ELK
Table of Contents
Introduction to Threat Hunting in Enterprise Environments
The Role of Splunk and ELK in Threat Detection
Setting Up Splunk and ELK for Threat Hunting
Threat Hunting Techniques and Queries
4.1. Anomaly-Based...
RED TEAM Operator: Malware Development Essentials Course
32 Lessons
365-day access LIFE TIME
$199 FREE
A course on becoming a better ethical hacker, pentester and red teamer by learning offensive security tools development in Windows.
Welcome to Malware Development Essentials course!
Are...
How to Detect and Analyze Rootkits on Linux and Windows: Best Practices for Security Professionals
Rootkits are among the most insidious forms of malware. They operate at the lowest levels of an operating system, making them difficult to detect, remove, and analyze. In this article, we will...
Bypassing Modern WAFs: Techniques and Tools
Introduction
Web Application Firewalls (WAFs) serve as a crucial defense mechanism against web-based threats, filtering and monitoring HTTP traffic to prevent attacks such as SQL injection, cross-site scripting (XSS), and remote command execution...
Attacks on Cloud Infrastructure: AWS, Azure, and Google Cloud Under the Microscope
The adoption of cloud services has grown exponentially in recent years, offering companies scalability, efficiency, and flexibility. However, this advancement has also brought a broader attack surface and new...
Certified Red Team Professional Lab Objective:
The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of...
AD CS Attacks for Red and Blue Teams Lab Objective:
Identity plays a crucial role in security of an enterprise environment. Certainly, Identity is the new security perimeter. In an enterprise environment, Identity is usually managed by Active Directory or by Azure AD in case of a Hybrid...
Top 10 Hacking Techniques Against Windows: Red Team vs. Blue Team Perspective
Windows remains the most widely used operating system worldwide, making it a prime target for cyberattacks. Threat actors, from script kiddies to advanced persistent threats (APTs), continuously exploit its weaknesses...
Cyber Threat Intelligence Toolkit: The Ultimate Guide for Security Professionals
Introduction
In today's rapidly evolving cybersecurity landscape, organizations struggle to detect and mitigate new threats before they cause serious damage. The key to a robust defense lies in understanding and...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.