Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide.
Real-world examples and step-by-step instructions to provide professional guidelines and recommendations.
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide.
The Fourth International Conference on Computational Science and Technology.
The latest hacking methods. Featuring coverage of vulnerability discovery and reverse engineering.
The methods cyber threat actors use to compromise the hardware and software central industrial control systems.
Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data.
The objective of the book is to summarize to the user with main topics in certified ethical hacker course.
Teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks.
Explore modern web application exploitation techniques using Metasploit and practical attack workflows.
Practical end-to-end penetration testing recipes using Kali Linux and modern ethical hacking techniques.
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!
Learn Windows-focused penetration testing techniques using Kali Linux and modern offensive security tooling.
Understand how social engineering attacks work and how to defend against human-focused security threats.
Over 70 practical recipes to master the Metasploit Framework and improve penetration testing workflows.
Build a network security threat model. For individuals who want to be part of a vulnerability management team.
A complete pentesting guide facilitating smooth backtracking for working hackers.
Learn how to secure enterprise network infrastructure through practical defensive and monitoring techniques.
From elicitation, pretexting, influence and manipulation all aspects of social engineering are discussed.
Build a network security threat model with this guide. For individuals who want to be part of a vulnerability management team.
Investigate different aspects of pen testing tools, methodologies, and defense strategies. (cached)
Effective Information Sharing for Pentest Teams. (cached)
Learn the art of offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.
In-depth course which covers the tools and techniques for performing penetration testing.
Designed to equip you with the skills required to become an expert in Cyber Security.
In 2026, we've taken Dradis even further with context awareness, prompt library building, redesigned navigation, API scanner uploads, and a new MITRE ATT&CK calculator.
In 2025, managing the information flow during assessments is just as important as finding vulnerabilities.
Report Writing Is Half the Battle: Finish Your Report in Less Time and Get Back to Hacking.
Learn How to Cut Your Reporting Time in Half - ARSENAL THEATER DEMO.
19 Years Helping Security Teams Spend More Time Testing and Less Time Reporting.
Dradis is an extensible, cross-platform, open source collaboration framework for InfoSec teams.
Dradis 3.1: A Year of Updates. Dradis is a cross-platform, open source collaboration framework for InfoSec teams.
DRADIS FRAMEWORK 3.0 Three years after our last official release, we've got a new version of the app.
Dradis 3.1: A Year of Updates. Dradis is a cross-platform, open source collaboration framework for InfoSec teams.
Dradis Framework: API, Excel, and more.
Dradis Framework: Creating custom plugins.
Dradis Framework: Creating custom plugins.
Why teams neeed, and would want to use Dradis Framework
General client side structure, dispatcher, plugin framework, Nmap plugin.
An overview of the first ever Dradis Framework tool.
Loading form...
Your email is kept private. We don't do the spam thing.