The Web Security Academy is a free online training center for web application security, brought to you by PortSwigger. Create an account to get started.| portswigger.net
Offensive security tools for 2025: Metasploit, Nuclei, Bloodhound & more. Uncover and remediate vulnerabilities before they’re exploited.| HackerTarget.com
Yesterday, a Reuters photographer captured a photo of the freshly-ousted former National Security Advisor Mike Waltz checking his Signal messages during a Trump cabinet meeting. If you're not familiar with Waltz, he's most well known for inviting The Atlantic's editor-in-chief to secret Trump administration war crimes Signal group. They discussed,| micahflee
There are many free (and even more paid) tools to help shift-left security. These includeSAST, Secret Scanners, and Dependency scanners| Spectral
Red team exercises don't have to be expensive exercises. Here's a few simple ways, and resources, to conduct red team exercises on a budget.| TrueFort
This is a walkthrough of the VAmPI vulnerable API. Use it to test your API hacking skills. This walkthrough shows you how to tackle each task, step by step.| Zero Day Hacker
This post contains all trainings and tutorials that could be useful for offensive security's OSWE (WEB-300) certification. I will be updating the post during my lab and preparation for the exam.| z-r0crypt.github.io
The Web Security Academy is a free online training center for web application security, brought to you by PortSwigger. Create an account to get started.| portswigger.net
Introduction to Wordpress Subpath Auditor, a homemade tool that can be used to audit various components within a Wordpress installation. It relies on docker, git, php, wordpress, python, and virtualenv.| thinkloveshare.com
Bots are not always bad It might be tempting to just straight up set up a big firewall with lots and lots of rules to try and block each and every bot trying to access your website.You might want t…| Let's reverse!
Organisations with influence, financial power, and advanced technology are targeted by actors seeking to steal or abuse these assets. A career in information security is a promising avenue to support high-impact organisations by protecting against these attacks, which have the potential to disrupt an organisation's mission or even increase existential risk.| 80,000 Hours