Cross Site Scripting Payloads 7 Aug 2024 We curate a set of fun and interesting Cross Site Scripting (XSS) payloads. They’re designed for quick... Read more
Prowl 7 Aug 2024 Prowl is an open source data harvesting tool written in Python to help alleviate some of the more... Read more
PoshC2 documentation 7 Aug 2024 We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/. For your convenience, we have also embedded it below. Read more
Penetration Testing 7 Aug 2024 We are looking for passionate and skilled penetration testers with professional experience. There are multiple roles available... Read more
Accelerator Program 7 Aug 2024 Do you want a job in cyber security but don’t know how to break into the industry? Tired... Read more
Rocktastic 7 Aug 2024 Bigger, better (faster, stronger…) Bigger isn’t always better, but sometimes it is. If you need a huge word... Read more
Advanced Threat Actor Simulation - Red Team Training 7 Aug 2024 This course will train your already inquisitive mind how to emulate real world threat actors. It’s fast paced... Read more
CVE-2018-13442: SolarWinds NPM SQL Injection 7 Aug 2024 A SQL injection vulnerability has been discovered in SolarWinds’ Network Performance Monitor (NPM). This vulnerability has been designated... Read more
ESG risks in Latin America and the Caribbean's seafood... 2 Aug 2024 Companies sourcing fish in Latin America & the Caribbean (LAC) urgently need to tackle environmental, social, and human... Read more
Vulnerabilities in AI Agents 25 Jul 2024 LLMs are becoming increasingly accessible to everyone. It is very easy to create your own LLM system, however... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*