Free Educational Resources

Cyber Security
Academy

Master cybersecurity with our comprehensive guides. From network fundamentals to advanced penetration testing.

298
Articles
10
Pillar Guides
14
Categories
All 298 Networking 58 Red Team 40 Blue Team 26 Cloud 17 Cryptography 8 Identity 5 Coding 6 Compliance 11 Career 1 AI Security 69
Pillar Guide

Web Application Security: Complete OWASP Guide 2024 - WhoisNexus

Master web application security with OWASP Top 10, XSS, SQL injection, CSRF prevention. Secure coding practices and penetration testing techniques.

Read Article
Hacking

Linux Privilege Escalation: Techniques & Prevention - WhoisNexus

Understand Linux privilege escalation techniques: SUID binaries, sudo misconfigurations, kernel exploits, and how to prevent them.

Read Article
Hacking

XSS (Cross-Site Scripting) Prevention Guide - WhoisNexus

Learn XSS attack types: Reflected, Stored, DOM-based. Implement prevention with output encoding, CSP, and secure frameworks.

Read Article
Hacking

Autonomous Vehicle Security

Hacking a Tesla. CAN Bus injection and GPS Spoofing.

Read Article
Hacking

Writing Custom Exploits in Python

Moving beyond Metasploit. Writing buffer overflow PoCs and fuzzers in Python.

Read Article
Hacking

Car Hacking & CAN Bus

Hacking vehicles via the ODB2 port. Injecting CAN messages to control brakes and steering.

Read Article
Hacking

Bluetooth Low Energy (BLE) Attacks

Hacking Smart Locks, FitBits, and Medical Devices. Sniffing and Replaying BLE packets.

Read Article
Hacking

Raspberry Pi Hacking Station

Building a Drop Box. How to leave a $35 computer behind enemy lines for persistent access.

Read Article
Hacking

Serverless Security Risks (Lambda)

No server doesn't mean no security. Event Injection, Over-Privileged Functions, and DoS.

Read Article
Hacking

Burp Suite Web Hacking Guide

The Man-in-the-Middle Proxy. Intercepting requests, modifying data on the fly, and automating attacks.

Read Article
Hacking

Metasploit Framework: The Hacker's Swiss Army Knife

Exploiting vulnerabilities with msfconsole. Understanding Payloads, Meterpreter, and the Exploitation lifecycle.

Read Article
Hacking

XXE (XML External Entity) Injection

Reading local files via XML parsers. How legacy XML features became a critical vulnerability.

Read Article
1 2 3 4

Page 1 of 4 • Showing 12 of 40 articles