Free Labs to Train Your Pentest / CTF Skills: - ACADEMY HACKAFLAG: https://academy.hackaflag.com.br - ATTACK DEFENSE: https://attackdefense.com - ALERT TO WIN: https://alf.nu/alert1 - BLUE TEAM LABS: https://blueteamlabs.online - CTF KOMODO SECURITY: https://ctf.komodosec.com - CTFTIME: https://ctftime.org - CMD CHALLENGE: https://cmdchallenge.com - CYBERDEFENDERS: https://cyberdefenders.org - CYBERSECLABS: https://www.cyberseclabs.co.uk - CRYPTOHACK: https://cryptohack.org - EXPLOTATION EDUCATION: https://exploit.education - ECHO CTF: https://echoctf.red - GOOGLE CTF: https://capturetheflag.withgoogle.com - HACKTHEBOX: https://www.hackthebox.com - HACKTHIS: https://www.hackthis.co.uk - HACKSPLAINING: https://www.hacksplaining.com/exercises - HACKER101: https://ctf.hacker101.com - HACKER SECURITY: https://capturetheflag.com.br - HACKSEC: https://hackersec.com/ctf/ - HACKING LAB: https://www.hacking-lab.com/index.html - HSTRIKE: https://hstrike.com - IMMERSIVE LABS: https://immersivelabs.com - KOMODOSEC: http://ct
FEATURES
SIMILAR TOOLS
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.