Autopsy — Introduction to Digital Forensics
Learn the fundamentals of Autopsy — an easy-to-use digital forensics platform for analyzing disk images, recovering files, timeline analysis, and creating forensic reports.
Learn the fundamentals of Autopsy — an easy-to-use digital forensics platform for analyzing disk images, recovering files, timeline analysis, and creating forensic reports.
A practical, hands-on overview of Burp Suite — proxy workflow, core tools (Proxy, Repeater, Intruder, Scanner), extensions, and safe lab exercises for web application testing.
Explore essential cybersecurity tools used for network analysis, penetration testing, digital forensics, and defense. Learn how each tool strengthens modern security operations.
Hands-on guide to Hashcat — GPU-accelerated password recovery tool. Covers installation, attack modes (dictionary, mask, combinator), rule usage, tuning, hash formats, performance tips, and safe lab exercises.
Practical guide to THC Hydra — a fast, flexible network login cracker. Learn installation, common attack modes (SSH, FTP, HTTP forms), command examples, tuning, defenses, and safe lab exercises.
Practical guide to John the Ripper — installation, workflows (identification → wordlist → rules → incremental), common commands, hash formats, and safe hands-on labs.
Practical guide to Metasploit, installation, workflow (recon → exploit → post-exploit), common modules, msfconsole and msfvenom usage, and safe lab exercises.
Learn how to use Nikto, an open-source web server scanner, to identify potential vulnerabilities and misconfigurations in web applications safely and effectively.
Learn how to use Nmap for network discovery, port scanning, service/version detection, OS fingerprinting, and safe scanning practices.
Practical guide to using tcpdump for packet capture and quick network forensics — capture syntax, common filters, writing/reading pcap files, and safe lab exercises.
Curated list of essential cybersecurity tools organized by category: reconnaissance, exploitation, scanning, monitoring, forensics, password cracking, cloud security, and developer/CI tooling. Includes quick install tips, example commands, and best-practice notes.
Learn how to capture, analyze, and understand network packets using Wireshark. A beginner-friendly guide to mastering one of the most powerful network analysis tools.