Information security, cybersecurity, network security, and other topics are covered in security tutorials. To help you stand out in the IT business, learn skills like Ethical Hacking and Penetration Testing, Digital Forensic and Incident Response, Buffer Overflow, and many more.
DNS Enumeration Using DNSRecon
Netcraft – Information Gathering Platform
Information Gathering Using Discover
BuiltWith – Technology Profiler
Check Your Usernames And See If You Have Been Pwned
Online DNS Reconnaissance With Robtex
Learn About The Target Host With Dmitry
DNS Enumeration Using Domain Information Groper (Dig)
Grabify: IP Logger & URL Shortener – Track People Location
Dracnmap – Information Gathering And Network Exploitation
Subdomain Enumeration With – Knock
FOCA – Fingerprinting Organizations With Collected Archives
Red Hawk – Web Application Scanner For Recon
FBI – Facebook Information Gathering Tool
R3con1z3r – Lightweight Web Recon Tool
AngryFuzzer – Another Fuzzing Tool
Automate Reconnaissance With Quasar
ReconDog – All-In-One Tool For Quick Reconnaissance
Sn1per – Automate Information Gathering And Penetration Testing
OSINT-SPY – Hacker’s Search Engine
InfoG – Open-Source Information Gathering Tool
ReconSpider – Comprehensive OSINT Framework
Perform Various OSINT Techniques With DataSploit
Shodan – The Search Engine For IoT
Recon-Ng – Web Application Reconnaissance
Miranda – Discover Universal Plug And Play (UPnP) Hosts
Network Scanning And Enumeration Using Dmitry
Network Scanning And Enumeration Using Hping3
Network Scanning And Enumeration Using Sparta
Network Scanning And Enumeration Using Sandmap
Netdiscover – Network Address Discovering Tool
Angry IP Scanner For Your Network
Scan Your Network With Unicornscan
Scan The Network With Armitage
SolarWinds’ Network Topology Mapper
Lansweeper – Network Inventory And Resource Management
Discovering And Enumerating With Metasploit
Network Traffic Analysis And Sniffing Using Wireshark
Analyzing Patterns And Signatures Of DoS Attacks Using Wireshark
Analyzing Patterns And Signatures Of SYN Flood Attacks Using Wireshark
Analyzing Patterns And Signatures Of ARP Spoofing Using Wireshark
Sniffing Usernames And Passwords Using Wireshark
Detect WiFi Jamming Attempts With Wireshark
Analyzing A Bot-Infected Host With Wireshark
Analyzing Patterns And Signatures Of An Exploit Using Wireshark
Network Statistics Tool Darkstat
Vulnerability Assessment Using Qualys
Vulnerability Assessment Using SQLiv
Vulnerability Assessment Using Nikto
Nessus – Vulnerability Assessment Tool
Nexpose – Red Team’s Best Friend
Open Source Vulnerability Assessment Tool – OpenVAS
Most Widely Used Web Application Scanner – OWASP ZAP
Web Application Scanner – WAScan
Uniscan – Web Application Assessment Tool
Find Default Misconfiguration And Insecure Files With Spaghetti
Phantom Evasion – Payloads And Backdoors Creation Tool
Powershell Reverse Shell With Social-Engineering-Toolkit
Powershell Alphanumeric Shellcode Injector
Creating Basic Mac OS Backdoor With Msfvenom
Creating Windows OS Backdoor With Msfvenom
Creating Injectable Shellcodes With Venom
Compile Malware With “TheFatRat”
Hiding Msfvenom Backdoor In JPG Image
Making A Trojan File For Mac OS
Compromise Your Targets With PowerShell Agents Using The Empire Tool
Empire – Creating Malicious Payloads For Mac OS
Chaos – Creating A Persistent Backdoor And Bypassing Anti-Virus Programs
Creating Linux Backdoor With The Empire Tool
Compromising Operating Systems Through Fake Software Updates
Embedding Malicious Codes Into Files During The Download Process
Shellter – Creating An Undetectable Backdoor
Exploiting Local File Inclusion Vulnerabilities In Web Applications
Local File Inclusion Using PHP Include
Local File Inclusion Using PHP Filter (Base64 Encoding)
Exploiting Remote File Inclusion Vulnerabilities In Web Applications
Exploiting Code Execution Vulnerabilities In Web Applications
Exploiting File Upload Vulnerabilities Using Weevely
Exploiting File Upload Vulnerabilities Using Msfvenom
File Upload Using A Double Extension Method
File Upload By Modifying Content Type
File Upload By Injecting Null Hex Character
Unrestricted File Upload (Medium-Security Level)
Unrestricted File Upload (High-Security Level)
Slow HTTP Denial-Of-Service Attack
Security Risks With Robots.Txt Files
Samba Arbitrary File Access Vulnerability Attack
Cross-Site Scripting – Non-Persistent (Reflected) XSS
Cross-Site Scripting – Persistent (Stored) XSS
Cross-Site Scripting – DOM-Based XSS
Using BeEF Scripts For XSS Attacks
Post-Exploitation Techniques Part-1 (Meterpreter Fundamentals)
Post-Exploitation Techniques Part-2 (File System Commands)
Post-Exploitation Techniques Part-3 (Maintaining Access)
Post-Exploitation Techniques Part-4 (Capturing Keystrokes & Screenshots)
Post-Exploitation Techniques Part-5 (Pivoting & Hosts Discovery)
Post-Exploitation Techniques Part-6 (Scanning & Compromising Hosts)
Social Engineering And Possible Attack Vectors
BeEF And Man-In-The-Middle Attack
Social Engineering With Blackeye
Social Engineering With Social Fish
Mass Mailer Attack Using Social Engineering Toolkit
Generate A QR Code Attack Vector
Create Infectious USB/CD Media
Spear-Phishing Attack With Social Engineering Toolkit
Replicating Websites With HTTrack And Harvest Credentials
Phishing With A Malicious Macro File
Embedding Malicious Payloads Into Any File Types (Method-1)
Linux Basics — Command-Line Interface (Part 1)
Linux Basics — Command-Line Interface (Part 2)
Linux Basics — Command-Line Interface (Part 3)
Linux Basics — Command-Line Interface (Part 4)
Linux Basics — Command-Line Interface (Part 5)
Linux Basics — Command-Line Interface (Part 6)
Linux Basics — Command-Line Interface (Part 7)
Our goal is to provide you with the skills you need to prepare for the next step in your cybersecurity career, no matter where you are on the path.