We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Exploitation with Metasploit
Sniffing and Evasion
Pass the Hash with Mimikatz
Reconnaissance/Pen Testing
SQLi with Burp Suite, WebGoat
Automated AppSec with ZAP
Attacking Juice Shop with Burp Suite
XSS with w3af, DVWA
Forensics Investigation with Autopsy
Malware Detection with YARA Rules
Malware Traffic Analysis with Wireshark
Threat Hunting with Security Onion
Threat Modeling & STRIDE Security
Log Clearing
Powershell Empire
Remote Code Execution
Read Prep
Reading Prep
Cloud Detective Controls
Logging and Monitoring
Cloud Network Security
Cloud Identity and Access Management (IAM) with AWS
Intrusion Detection and Prevention Systems (IDS/IPS)
Reconstructing a Cloud Attack with Splunk
Log Analysis with Splunk
Setting up Splunk SIEM