Free Educational Resources

Cyber Security
Academy

Master cybersecurity with our comprehensive guides. From network fundamentals to advanced penetration testing.

298
Articles
10
Pillar Guides
14
Categories
All 298 Networking 58 Red Team 40 Blue Team 26 Cloud 17 Cryptography 8 Identity 5 Coding 6 Compliance 11 Career 1 AI Security 69
Hacking

Cross-Site Scripting (XSS) Deep Dive

Master XSS exploitation. Reflected, Stored, and DOM-based attacks. Session Hijacking, Keylogging, and BeEF framework.

Read Article
Hacking

SQL Injection (SQLi) Deep Dive

The ultimate guide to SQL Injection. From Error-Based and Union-Based to advanced Time-Based Blind SQLi and SQLMap automation.

Read Article
Hacking

APT Groups: Cyber Espionage Tactics

Inside the world's elite hacking units. How APT28 (Russia), APT41 (China), and Lazarus (North Korea) operate.

Read Article
Hacking

Windows Kernel Exploitation: The Road to Ring 0

Local Privilege Escalation (LPE) in Windows. Understanding IOCTL, abusing HEVD, Token Stealing Shellcode, and bypassing KASLR/SMEP.

Read Article
Hacking

GraphQL Penetration Testing Guide

Stop hacking REST endpoints. Learn how to exploit GraphQL Introspection, Batching Attacks, and Nested Recursion DOS.

Read Article
Hacking

Drone Hacking & Countermeasures

Hijacking DJI drones, signal jamming, and spoofing GPS coordinates.

Read Article
Hacking

Smart Contract Hacking (Solidity)

Hacking Web3. Reentrancy attacks, Integer Overflows, and Flash Loan exploits.

Read Article
Hacking

Exploit Development & Shellcoding

Writing your first Buffer Overflow. Calculating EIP offset and identifying bad chars.

Read Article
Hacking

Satellite Hacking & Space Security

Hacking Starlink, GPS Spoofing, and intercepting SATCOM signals with a $20 Antenna.

Read Article
Hacking

Payment Gateway Hacking

Buying a MacBook for $1. Understanding integer overflows, race conditions, and parameter tampering in e-commerce.

Read Article
Hacking

SCADA & ICS Hacking

Industrial Control Systems. Hacking power grids, water plants, and PLCs with Modbus.

Read Article
Hacking

Purple Teaming & Collaboration

Red Team attacks. Blue Team defends. Purple Team maximizes value by sharing notes.

Read Article
1 2 3 4

Page 2 of 4 • Showing 12 of 40 articles