A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.
Contributions are welcome and appreciated! How to contribute: read the guidelines to maximize the chances for a fast, easy and effective review process. Become an Ayehu Certified IT Automation Developer! Write code for the custom activities! Export your custom activities! Create a Pull Request on GitHub. Review Process: Once you open a pull request,
A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.
Online hacking game with realistic hacking experience and player interaction.
A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.
A wargame that challenges your hacking skills
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.