Offensive Operations

Penetration testing, exploitation, and CNO resources.


Intermediate
Exploit Database

Offensive Security's public exploit archive. Search disclosed exploits by product, CVE, or platform. Useful reference fo…

20 min 1
Intermediate
Hack The Box — Starting Point

Guided intro machines from HTB. Covers basic recon, exploitation, and privilege escalation. Progress to Pro Labs for adv…

5h 1
Intermediate
LiveOverflow — Binary Exploitation YouTube Series

Free YouTube playlist covering binary exploitation fundamentals. Great supplement to pwn.college. Covers BOF, format str…

5h 1
Intermediate
OWASP Top 10

The canonical list of critical web application security risks. Required reading for CEH, OSCP, and any web application t…

1h 2
Intermediate
PortSwigger Web Security Academy

Free, hands-on web application security labs from the makers of Burp Suite. Covers SQLi, XSS, SSRF, OAuth, deserializati…

10h 1