INE Security
Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.
Find helpful guides and articles in our comprehensive knowledge base resources.
Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.
Online hacking game with realistic hacking experience and player interaction.
Security cheatsheets to aid penetration testers and security enthusiasts in remembering useful but not frequently used commands.
Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
Free Labs to Train Your Pentest / CTF Skills
Connect and learn from experts and peers in the Microsoft Community Hub.
A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.
A deliberately insecure web application for teaching web application security lessons maintained by OWASP.
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.
Security cheatsheets to aid penetration testers and security enthusiasts in remembering useful but not frequently used commands.
Cybersecurity training platform with courses, certifications, and study guides.
The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.
Comprehensive cheat sheet for SQLite SQL injection techniques and payloads.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A vulnerable web application for learning about web application vulnerabilities and writing secure code.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
Website providing information on Snap7 open-source communication library.
A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.
Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.
Java MODBUS simulator with scriptable functions and dynamic resource creation.