Skip to content

Latest commit

Β 

History

History

Modules

πŸ”Ή ~ 33 Modules in Total

βœ… ~ 18 Modules is Completed

πŸ”Ά ~ 1 Modules in Progress

Modules are made up of bite-sized labs


  • FREE - Need Just Register, Login and Start.
  • VIP - Need Just Register, Login, Subscription and Start.

βœ… Burp Suite

  • Burp Suite is the industry standard tool for web application hacking, and is essential in any web penetration test

βœ… Metasploit

  • Metasploit is the most widely used exploitation framework. Learn how to use it and unlock its full potential.

  • Get hands-on, learn about and exploit some of the most popular web application vulnerabilities seen in the industry today.

  • Learn the basics of passive and active network reconnaissance. Understand how common protocols work and their attack vectors.

βœ… Nmap

  • Learn how to leverage the Nmap network scanner to discover live hosts and open ports using basic and advanced scan options.

  • Explore the different techniques to gain initial access to a target system and network from a red teamers perspective.

  • Learn how to analyze and defend against phishing emails. Investigate real-world phishing attempts using a variety of techniques.

  • Learn the core components of a red team engagement, from threat intelligence to OPSEC and C2s

  • Understand what Offensive Security entails, and practice breaking into computer systems by exploiting applications and networks.

  • Learn about the latest industry threats. Get hands-on experience identifying, exploiting, and mitigating critical vulnerabilities.

  • Learn Defensive Security by using digital forensics in an investigation and applying security operations to stop a live cyber attack.

  • Many servers and security tools use Linux. Learn how to use the Linux operating system, a critical skill in cyber security.

  • To become a better hacker it's vital to understand the underlying functions of the world wide web and what makes it work.

  • Understand what a penetration test involves, including testing techniques and methodologies every pentester should know.

  • Learn the fundamental techniques that will allow you to elevate account privileges in Linux and windows systems.

  • Learn how to bypass and evade different security solutions used in the industry such as firewalls, IDS/IPS, and antivirus.
    • VIP - Network Security Solutions

      Learn about and experiment with various IDS/IPS evasion techniques, such as protocol and payload manipulation.

    • VIP - Firewalls

      Learn about and experiment with various firewall evasion techniques, such as port hopping and port tunneling.

    • VIP - Sandbox Evasion

      Learn about active defense mechanisms Blue Teamers can deploy to identify adversaries in their environment.


  • Understand, enumerate and attack various networking services in real-world environments.

  • Familiarise yourself with the skills, research methods, and resources used to exploit vulnerable applications and systems.

  • Become cyber aware and protect yourself from common security attacks by working through interactive real-world scenarios.

  • Understand the core security issues with web applications, and learn how to exploit them using industry tools and techniques.

  • Cryptography is essential in security. Learn how its used to preserve integrity and confidentiality of sensitive information.

  • Understand what is offensive and defensive security, and learn about careers available in cyber.

  • Hacking Windows is often daunting. Grasp the fundamentals of core Windows concepts and Active Directory vulnerabilities.

  • Once you have initial access on a machine, learn how to escalate your account privileges to root.

  • Strengthen your skills by exploiting a range of different applications and services, from networking to web to privilege escalation.

  • Identify how attackers are developing their techniques to use in your defensive strategy.

  • Learn how to configure and utilise tooling to ensure that suspicious activity is quickly identified and dealt with in your environment.
    • VIP - Core Windows Processes

      Explore the core processes within a Windows operating system and understand what is normal behavior. This foundational knowledge will help you identify malicious processes running on an endpoint!

    • VIP - Sysinternals

      Learn to use the Sysinternals tools to analyze Window systems or applications.

    • VIP - Windows Event Logs

      Introduction to Windows Event Logs and the tools to query them.

    • VIP - Sysmon

      Learn how to utilize Sysmon to monitor and log your endpoints and environments

    • Free - Suricata

      Learn how to install and configure Suricata to detect real-time threats.

    • VIP - Osquery

      Learn how to use this operating system instrumentation framework to explore operating system data by using SQL queries.

    • VIP - Splunk 101

      This room will cover the basics of Splunk.

    • VIP - Splunk 2

      Part of the Blue Primer series. This room is based on version 2 of the Boss of the SOC (BOTS) competition by Splunk.

    • Free - OpenEDR

      Learn what is Endpoint Detection and Response (EDR) with Comodo's OpenEDR.


  • The best way to understand how attackers work is to get hands on experience with their techniques.

  • Incidents are inevitable. Learn how to identify and respond to them.

  • Analyse malicious files to prevent malicious actions and identify attacks.

  • Learn the core concepts of how computers communicate with each other and types of network weaknesses.

  • Get hands-on access to Windows and it's security controls. These basics will help you in identifying, exploiting and defending Windows.

  • Learn to use PowerShell and Python in different stages of a penetration test and take your pentesting craft to the next level.
    • Free - Python Basics

      Using a web-based code editor, learn the basics of Python and put your knowledge into practice by eventually coding a short Bitcoin investment project.

    • VIP - Python for Pentesters

      Python is probably the most widely used and most convenient scripting language in cybersecurity. This room covers real examples of Python scripts including hash cracking, key logging, enumeration and scanning.

    • VIP - Hacking with PowerShell

      Learn the basics of PowerShell and PowerShell Scripting

    • VIP - PowerShell for Pentesters

      This room covers the principle uses of PowerShell in Penetration Tests. Interacting with files, scanning the network and system enumeration are covered.