• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

#redteamvsblueteam

  1. dEEpEst

    Cloud Red Team : Attacking and Defending Azure - Advanced Edition [June 2025] 2025

    Advanced Azure Attacks - Advanced Azure is widely used by enterprises for a variety of purposes. There is a huge offering of services across various categories in Azure - Identity, Compute, Networking, Storage, Databases, Analytics, Security and many more. Azure, like any other cloud, changes...
  2. dEEpEst

    Cyber Threat Intelligence 101 2025

    Course Overview Welcome to the arcX Cyber Threat Intelligence 101 course - an essential introduction to the world of cyber threat intelligence (CTI). Discover the basics and gain a new appreciation for this ever-growing area within cyber security. This short course serves as a sneak peek into...
  3. dEEpEst

    FOR608: Enterprise-Class Incident Response & Threat Hunting 2025 70GB

    FOR608: Enterprise-Class Incident Response & Threat Hunting FOR608: Enterprise-Class Incident Response & Threat Hunting focuses on identifying and responding to incidents too large to focus on individual machines. By using example tools built to operate at enterprise-class scale, students learn...
  4. dEEpEst

    Certified Evasion Techniques Professional (CETP) 2025 3GB

    Certified Evasion Techniques Professional (CETP) In recent years, Endpoint countermeasures have improved rapid in their detection and response capabilities. It now takes a lot of investment by red teams to develop tradecraft and techniques that can reliably evade or bypass these...
  5. dEEpEst

    PEN-300: Advanced Evasion Techniques and Breaching Defenses 2025.4

    PEN-300: Advanced Evasion Techniques and Breaching Defenses Building on the skills acquired in PEN-200, OffSec’s PEN-300 course explores advanced penetration testing techniques against hardened targets. Learners gain hands-on experience bypassing security defenses and crafting custom exploits...
  6. dEEpEst

    CPEH - Certified Professional Ethical Hacker 2025-04-16

    Prerequisites 12 months of IT security experience 12 months of Networking Experience Description This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request. The vendor-neutral Certified Penetration Testing...
  7. dEEpEst

    TCM - Advanced Web Hacking 2025 2025

    Course Overview Advanced Web Hacking is designed to take your web penetration testing skills to the next level. This course dives deep into advanced topics, exploring edge-case vulnerabilities, sophisticated attacks, and complex scenarios faced in modern web applications. Each module will offer...
  8. dEEpEst

    SEC450: Blue Team Fundamentals: Security Operations and Analysis 18GB

    SEC450 provides students with technical knowledge and key concepts essential for security operation center (SOC) analysts and new cyber defense team members. By providing a detailed explanation of the mission and mindset of a modern cyber defense operation, this course will jumpstart and empower...
  9. dEEpEst

    Offensive Development w Greg Hatcher & John Stigerwalt 4GB 2025

    Offensive Development w Greg Hatcher & John Stigerwalt In the Intro to Offensive Tooling class, you will learn about many of the tools used by attackers to identify vulnerabilities and exploit them. This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit...
  10. dEEpEst

    SEC530: Defensible Security Architecture and Engineering 36 GB 2025

    SEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise This course is designed to help students establish and maintain a holistic and layered approach to security, while taking them on a journey towards a realistic 'less trust' implementation...
  11. dEEpEst

    Hacking 🛠️ Resource: Top 24 Tools for Threat Intelligence, OSINT, and Attack Surface Mapping

    🛠️ Resource: Top 24 Tools for Threat Intelligence, OSINT, and Attack Surface Mapping Hey everyone, I’ve compiled a list of 24 valuable online tools to the HTDark Community that can aid in reconnaissance, threat intelligence gathering, attack surface mapping, and vulnerability analysis. Whether...
  12. dEEpEst

    Detecting Attacks in Real-Time

    Threat Hunting: Detecting Attacks in Real-Time with Splunk and ELK Table of Contents Introduction to Threat Hunting in Enterprise Environments The Role of Splunk and ELK in Threat Detection Setting Up Splunk and ELK for Threat Hunting Threat Hunting Techniques and Queries 4.1. Anomaly-Based...
  13. dEEpEst

    RED TEAM Operator: Malware Development Essentials Course 8 GB 2025

    RED TEAM Operator: Malware Development Essentials Course 32 Lessons 365-day access LIFE TIME $199 FREE A course on becoming a better ethical hacker, pentester and red teamer by learning offensive security tools development in Windows. Welcome to Malware Development Essentials course! Are...
  14. dEEpEst

    How to Detect and Analyze Rootkits

    How to Detect and Analyze Rootkits on Linux and Windows: Best Practices for Security Professionals Rootkits are among the most insidious forms of malware. They operate at the lowest levels of an operating system, making them difficult to detect, remove, and analyze. In this article, we will...
  15. dEEpEst

    Bypassing Modern WAFs

    Bypassing Modern WAFs: Techniques and Tools Introduction Web Application Firewalls (WAFs) serve as a crucial defense mechanism against web-based threats, filtering and monitoring HTTP traffic to prevent attacks such as SQL injection, cross-site scripting (XSS), and remote command execution...
  16. dEEpEst

    Attacks on Cloud Infrastructure

    Attacks on Cloud Infrastructure: AWS, Azure, and Google Cloud Under the Microscope The adoption of cloud services has grown exponentially in recent years, offering companies scalability, efficiency, and flexibility. However, this advancement has also brought a broader attack surface and new...
  17. dEEpEst

    Certified Red Team Professional (CRTP) 9 GB 2025

    Certified Red Team Professional Lab Objective: The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of...
  18. dEEpEst

    AD CS Attacks for Red and Blue Teams 7GB 2025

    AD CS Attacks for Red and Blue Teams Lab Objective: Identity plays a crucial role in security of an enterprise environment. Certainly, Identity is the new security perimeter. In an enterprise environment, Identity is usually managed by Active Directory or by Azure AD in case of a Hybrid...
  19. dEEpEst

    Top 10 Hacking Techniques Against Window

    Top 10 Hacking Techniques Against Windows: Red Team vs. Blue Team Perspective Windows remains the most widely used operating system worldwide, making it a prime target for cyberattacks. Threat actors, from script kiddies to advanced persistent threats (APTs), continuously exploit its weaknesses...
  20. dEEpEst

    Cyber Threat Intelligence Toolkit

    Cyber Threat Intelligence Toolkit: The Ultimate Guide for Security Professionals Introduction In today's rapidly evolving cybersecurity landscape, organizations struggle to detect and mitigate new threats before they cause serious damage. The key to a robust defense lies in understanding and...
Back
Top