Free Educational Resources

Cyber Security
Academy

Master cybersecurity with our comprehensive guides. From network fundamentals to advanced penetration testing.

407
Articles
10
Pillar Guides
15
Categories
All 407 Networking 76 Red Team 55 Blue Team 38 Cloud 25 Cryptography 11 Identity 8 Threats 1 Coding 9 Compliance 20 Career 2 AI Security 89
Hacking

HTTP Request Smuggling: CL.TE, TE.CL & TE.TE Attacks

Master HTTP request smuggling including CL.TE, TE.CL, and TE.TE variants. Learn detection, exploitation, and prevention of desync attacks.

Read Article
Hacking

Race Condition Attacks: TOCTOU & Concurrency Exploits

Master race condition vulnerabilities including TOCTOU, double-spend, and limit bypass attacks. Learn detection and prevention techniques.

Read Article
Hacking

WebSocket Security: Hijacking, CSWSH & Exploitation

Learn WebSocket security vulnerabilities including Cross-Site WebSocket Hijacking (CSWSH), origin bypass, and message injection. Complete penetration testing guide.

Read Article
Hacking

GraphQL Security: Introspection, Injection & DoS Attacks

Master GraphQL security including introspection attacks, query complexity DoS, batch attacks, and injection vulnerabilities. Complete penetration testing guide.

Read Article
Hacking

Linux Privilege Escalation: Techniques & Prevention - WhoisNexus

Understand Linux privilege escalation techniques: SUID binaries, sudo misconfigurations, kernel exploits, and how to prevent them.

Read Article
Hacking

XSS (Cross-Site Scripting) Prevention Guide - WhoisNexus

Learn XSS attack types: Reflected, Stored, DOM-based. Implement prevention with output encoding, CSP, and secure frameworks.

Read Article
Hacking

Autonomous Vehicle Security

Hacking a Tesla. CAN Bus injection and GPS Spoofing.

Read Article
Hacking

Writing Custom Exploits in Python

Moving beyond Metasploit. Writing buffer overflow PoCs and fuzzers in Python.

Read Article
Hacking

Car Hacking & CAN Bus

Hacking vehicles via the ODB2 port. Injecting CAN messages to control brakes and steering.

Read Article
Hacking

Bluetooth Low Energy (BLE) Attacks

Hacking Smart Locks, FitBits, and Medical Devices. Sniffing and Replaying BLE packets.

Read Article
Hacking

Raspberry Pi Hacking Station

Building a Drop Box. How to leave a $35 computer behind enemy lines for persistent access.

Read Article
Hacking

Serverless Security Risks (Lambda)

No server doesn't mean no security. Event Injection, Over-Privileged Functions, and DoS.

Read Article
1 2 3 4 5

Page 2 of 5 • Showing 12 of 55 articles