Training

Explore 87 curated cybersecurity tools, with 15,161 visitors searching for solutions

Damn Vulnerable GraphQL Application Logo

A deliberately vulnerable GraphQL application designed for security testing and educational purposes, containing multiple intentional flaws for learning GraphQL attack and defense techniques.

0
FARA Logo

FARA is a repository of purposefully erroneous Yara rules for training security analysts.

0
SANS Institute Logo

Leading provider of free cybersecurity training resources

0
Gray Hat Hacking v6 Lab 29 Logo

A hands-on cybersecurity laboratory environment for Gray Hat Hacking Chapter 29 that creates virtualized Docker and Kali Linux machines using Terraform for practical security training exercises.

0
OWASP Foundation Logo

A non-profit organization focused on improving the security of software through resources and training.

0
Web Application Exploits and Defenses Logo

An educational codelab that demonstrates web application vulnerabilities including XSS, XSRF, and code execution attacks along with their corresponding defensive measures.

0
Windows / Linux Local Privilege Escalation Workshop Logo

An educational workshop providing hands-on training materials, lab environments, and tools for learning local privilege escalation techniques on Windows and Linux systems.

0
Damn Vulnerable eXtensive Training Environment (DVXTE) Logo

DVXTE is a Docker-based training platform containing multiple vulnerable applications designed for cybersecurity education and skill development.

0
SANS Logo

SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.

0
OWASP Hackademic Challenges Logo

OWASP Hackademic Challenges is an educational web platform offering 10 realistic vulnerability scenarios for learning information security concepts through hands-on exploitation in a controlled environment.

0
MemLabs Logo

MemLabs provides CTF-styled memory forensics challenges designed to teach students and security researchers how to analyze memory dumps using tools like Volatility.

0
Cyber Security Acronyms and Terms Logo

A community-maintained glossary that defines and explains cybersecurity acronyms and terminology to help users understand security concepts beyond buzzwords.

0
InsecureBankv2 Logo

InsecureBankv2 is an intentionally vulnerable Android application with a Python back-end server designed for educational purposes in mobile security testing and Android vulnerability research.

0
Cybrary Logo

Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

0
DVHMA Damn Vulnerable Hybrid Mobile App Logo

DVHMA is an intentionally vulnerable Android hybrid mobile app built with Apache Cordova for security testing and educational purposes.

0