Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
How Does Social Engineering Work? From Planning to Execution
Cosmos Datasheet
Cosmos Attack Surface Management (CASM) Datasheet
CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks
The New CISO Special: Organizing the Chaos in Your First 100 Days
News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team
Cloud Security Podcast: Cloud Pen Test of AWS with Open Source
Red Team Datasheet
A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements
Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution
Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth
Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test
Swagger Jacker: Improved Auditing of OpenAPI Definition Files
Ace the OSEP Exam with Sliver Framework
Pragmatic AI & LLM Security Mitigations for Enterprises
OWASP ASVS: Unlocking Stronger Application Security
Strengthening Incident Response: Combining Tabletop Exercises with Red Team Engagements
Cosmos: Protecting the Perimeter
The Offensive Security Blueprint for Financial Services
AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies
Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities
Offensive Security Arsenal: Building and Mastering Custom Security Tools
Red Team Reality: Advanced Strategies for Modern Attack Simulation
The Art of Human Hacking: Social Engineering Success Stories
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.