Leaders in Information Security Training
Just type and press 'enter'
Penetration Testing with Kali Linux (PWK)
Offensive Security Wireless Attacks (WiFu)
Cracking the Perimeter (CTP)
Advanced Windows Exploitation (AWE)
Advanced Web Attacks and Exploitation (AWAE)
In-House Security Training
OSCP Certified Professional
OSWP Wireless Professional
OSCE Certified Expert
OSEE Exploitation Expert
OSWE Web Expert
Virtual Pentesting Labs
Penetration Testing Assessment Services
Advanced Attack Simulation Services
Application Security Assessment Services
Kali Linux VM and ARM Downloads
Kali Linux NetHunter Downloads
The Exploit Database
Google Hacking Database (GHDB)
Offensive Security Vision
Bug Bounty Program
Offensive Security Twitter Feed
Tweets by @offsectraining
Connect with us
Offsec Say Try Harder!
Watch our Offsec Jam
Popular Offsec Blog Posts
Kali 2.0 Dojo Black Hat / DEF CON USA 2015
Last years event was a rousing success, with many attendees staying all day long and working through the multi...
Kali Linux Evil Wireless Access Point
A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using ...
Kali Linux ISO of Doom
In our last blog post, we provided an example of running an unattended network installation of Kali Linux. Our...
Kali Linux on a Raspberry Pi (A/B+/2) with Disk Encryption
With the advent of smaller, faster ARM hardware such as the new Raspberry Pi 2 (which now has a Kali image bui...
Kali USB – Multiple Persistent Stores
One of the markings of the 1.0.7 Kali release was the introduction of Kali Live USB LUKS encrypted persistent ...
Booting Kali Linux Live Over HTTP
Kali Linux Features Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often makin...
Terms and Conditions
© Copyright 2015 Offensive Security