We train the top information security professionals
You don’t buy an OffSec certification.
You earn it.
“A will to suffer…is required for sure in order to finish the course.”
— Wesley Neelen – dearbytes.com
"If you are already considering to take the course, don’t hesitate and just go for it – you won’t regret it."
— Michael R. Heinzl
"Having been in information security for the past 6 or 7 years and having been on various security related courses I must say that the 101 course from offensive-security is one of the best."
— Jason Alexander CISSP, C|EH, CCSA, MCSE
Work your way into infosec
Penetration Testing with Kali Linux (PWK)
Our flagship ethical hacking course, designed and written by the Kali Linux developers.
Advanced Web Attacks & Exploitation (AWAE)
Learn advanced attacks and exploitations for web applications.
Cracking the Perimeter (CTP)
Advanced exploit development for experienced penetration testers.
Advanced Windows Exploitation (AWE)
The most challenging penetration testing course offered by OffSec.
Open Source Tools for the Infosec Community
We create, host, maintain, and evolve some of the top free penetration testing tools for infosec professionals.
News from behind the Door
OSCP holder Samuel Whang shares his perspective on why upgrading to the 2020 materials is worth it for those who have already completed PWK.Read More
As security researchers, we often find ourselves needing to look deep into various kernels to fully understand our target and accomplish our goals. Doing so on the Windows platform is no mystery, as there have been countless well-written posts about kernel debugging setups. For macOS, however, the situation is slightly different.
There are many great posts describing how to set up kernel debugging between two machines, but all of them suggest that SIP (System Integrity Protection) should be disabled for kernel debugging.... Read more »Read More