Cybersecurity Exploitation Resource

Browse 77 websites in this category • Page 2 of 4

Sites where Cybersecurity Exploitation Resource is a core feature are shown first, marked with a Core badge.

Promotion
sweet32.info favicon

Understand birthday attacks on 64-bit ciphers

Learn about the Sweet32 cryptographic attack and its impact on 64-bit block ciphers used in protocols like TLS and OpenVPN. Security insights included.

hak5.org favicon

Get hands-on with leading pentest hardware & guides

Hak5 offers pentesting tools, hacking tutorials, and a welcoming security community for cybersecurity pros, students, and red teams. Established in 2005.

attrition.org favicon

Explore unique computer security archives and news

Eclectic site offering internet and computer security resources, breach info, commentary, and archives for security enthusiasts and researchers.

mlq.me favicon

Explore microarchitectural security research

Personal site of Moritz Lipp, security researcher, sharing research on microarchitectural attacks, open-source projects, publications, and presentations.

breakdev.org favicon

Discover top offensive security tools and guides

Explore offensive security tools and in-depth research to support your red teaming and cybersecurity testing activities. Resources for security professionals.

thedfirreport.com favicon

Explore real cyberattack case studies

The DFIR Report shares real-world cyber intrusion cases, analysis, and threat intelligence to help security pros understand attacker tactics and improve defenses.

blackarch.org favicon

Access 2800+ security tools on Arch Linux

BlackArch Linux offers a lightweight, Arch-based operating system with thousands of penetration testing and cybersecurity tools for security professionals.

itm4n.github.io favicon

Explore hands-on Windows security research guides

Read in-depth articles on Windows security, pentesting, and vulnerability research, with guides, walkthroughs, and technical insights for security enthusiasts.

systemweakness.com favicon

Learn ethical hacking from real security experts

System Weakness publishes articles and guides on cybersecurity, ethical hacking, and infosec, helping readers learn about security and vulnerabilities.

vulnhub.com favicon

Download VMs for real-world hacking practice

VulnHub offers free downloadable vulnerable virtual machines for hands-on cybersecurity training, helping you practice ethical hacking and security skills.

capturetheflag.withgoogle.com favicon

Solve real security challenges online

Google CTF is an online cybersecurity competition where you solve security challenges, test your hacking skills, and learn about digital security.

52pojie.cn favicon

Join China’s top reverse engineering tech forum

A Chinese-language forum for software reverse engineering, cybersecurity, and sharing technical knowledge among enthusiasts and professionals.

willhackforsushi.com favicon

Explore real-world hacking tutorials and tools

A personal blog sharing hands-on hacking tutorials, cybersecurity tips, and project insights for enthusiasts interested in penetration testing and security tools.

thunderspy.io favicon

Check if your device is vulnerable to Thunderspy

Learn about Thunderbolt 3 security risks, view demos, and access tools to check if your device is vulnerable to Thunderspy attacks and how to protect it.

offensiveosint.io favicon

Discover offensive OSINT tools and insights

Explore open-source intelligence and cyber security tools, research, and resources focused on offensive OSINT techniques and surveillance insights.

gtfobins.github.io favicon

Discover security bypass techniques with Unix tools

Browse a curated list of Unix binaries that can help bypass local security restrictions in misconfigured systems. Useful for security testing and research.

fail0verflow.com favicon

Explore deep-dive console hacking tutorials

Read in-depth blogs on console hacking, vulnerabilities, and exploits for platforms like PS4, Nintendo Switch, and more. Technical insights for enthusiasts.

trojansource.codes favicon

Uncover hidden code vulnerabilities and defenses

Learn about Trojan Source attacks—how invisible vulnerabilities can be injected into source code through encoding tricks, and how to defend against them.

ired.team favicon

Explore practical red teaming and security notes

Find practical notes and resources on red teaming and offensive security to support learning, research, and hands-on cybersecurity activities.

gibsonsec.org favicon

Explore computer security insights and guides

Gibson Security shares insights, guides, and resources on computer security, privacy, and technology topics for those interested in digital safety.