Offensive Operations

Penetration testing, exploitation, and CNO resources.


Intermediate
Exploit Database

Offensive Security's public exploit archive. Search disclosed exploits by product, CVE, or platform. Useful reference fo…

20 min 1
Intermediate
Hack The Box — Starting Point

Guided intro machines from HTB. Covers basic recon, exploitation, and privilege escalation. Progress to Pro Labs for adv…

5h 1
Intermediate
LiveOverflow — Binary Exploitation YouTube Series

Free YouTube playlist covering binary exploitation fundamentals. Great supplement to pwn.college. Covers BOF, format str…

5h
Intermediate
OWASP Top 10

The canonical list of critical web application security risks. Required reading for CEH, OSCP, and any web application t…

1h 1
Intermediate
PortSwigger Web Security Academy

Free, hands-on web application security labs from the makers of Burp Suite. Covers SQLi, XSS, SSRF, OAuth, deserializati…

10h 1