Free Educational Resources

Cyber Security
Academy

Master cybersecurity with our comprehensive guides. From network fundamentals to advanced penetration testing.

407
Articles
10
Pillar Guides
15
Categories
All 407 Networking 76 Red Team 55 Blue Team 38 Cloud 25 Cryptography 11 Identity 8 Threats 1 Coding 9 Compliance 20 Career 2 AI Security 89
Hacking

Burp Suite Web Hacking Guide

The Man-in-the-Middle Proxy. Intercepting requests, modifying data on the fly, and automating attacks.

Read Article
Hacking

Metasploit Framework: The Hacker's Swiss Army Knife

Exploiting vulnerabilities with msfconsole. Understanding Payloads, Meterpreter, and the Exploitation lifecycle.

Read Article
Hacking

XXE (XML External Entity) Injection

Reading local files via XML parsers. How legacy XML features became a critical vulnerability.

Read Article
Hacking

Cross-Site Scripting (XSS) Deep Dive

Master XSS exploitation. Reflected, Stored, and DOM-based attacks. Session Hijacking, Keylogging, and BeEF framework.

Read Article
Hacking

SQL Injection (SQLi) Deep Dive

The ultimate guide to SQL Injection. From Error-Based and Union-Based to advanced Time-Based Blind SQLi and SQLMap automation.

Read Article
Hacking

APT Groups: Cyber Espionage Tactics

Inside the world's elite hacking units. How APT28 (Russia), APT41 (China), and Lazarus (North Korea) operate.

Read Article
Hacking

Windows Kernel Exploitation: The Road to Ring 0

Local Privilege Escalation (LPE) in Windows. Understanding IOCTL, abusing HEVD, Token Stealing Shellcode, and bypassing KASLR/SMEP.

Read Article
Hacking

GraphQL Penetration Testing Guide

Stop hacking REST endpoints. Learn how to exploit GraphQL Introspection, Batching Attacks, and Nested Recursion DOS.

Read Article
Hacking

Drone Hacking & Countermeasures

Hijacking DJI drones, signal jamming, and spoofing GPS coordinates.

Read Article
Hacking

Smart Contract Hacking (Solidity)

Hacking Web3. Reentrancy attacks, Integer Overflows, and Flash Loan exploits.

Read Article
Hacking

Exploit Development & Shellcoding

Writing your first Buffer Overflow. Calculating EIP offset and identifying bad chars.

Read Article
Hacking

Satellite Hacking & Space Security

Hacking Starlink, GPS Spoofing, and intercepting SATCOM signals with a $20 Antenna.

Read Article
1 2 3 4 5

Page 3 of 5 • Showing 12 of 55 articles