Leaders in Information Security Training
Just type and press 'enter'
Penetration Testing with Kali Linux
Offensive Security Wireless Attacks
Cracking the Perimeter
Advanced Windows Exploitation
Advanced Web Attacks and Exploitation
In-House Security Training
OSCP Certified Professional
OSWP Wireless Professional
OSCE Certified Expert
OSEE Exploitation Expert
OSWE Web Expert
Virtual Pentesting Labs
Advanced Penetration Testing Services
Advanced Attack Simulation
Application Security Assessment
Kali Linux Downloads
The Exploit Database
Google Hacking Database (GHDB)
BackTrack Linux (Retired)
Offensive Security Vision
Bug Bounty Program
Offensive Security Twitter Feed
Tweets by @offsectraining
Connect with us
Offsec Say Try Harder!
Watch our Offsec Jam
Popular Offsec Blog Posts
Kali 2.0 Dojo Black Hat USA 2015
Last years event was a rousing success, with many attendees staying all day long and working through the multi...
Kali Linux Evil Wireless Access Point
A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using ...
Kali Linux ISO of Doom
In our last blog post, we provided an example of running an unattended network installation of Kali Linux. Our...
Kali Linux on a Raspberry Pi (A/B+/2) with Disk Encryption
With the advent of smaller, faster ARM hardware such as the new Raspberry Pi 2 (which now has a Kali image bui...
Booting Kali Linux Live Over HTTP
Kali Linux Features Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often makin...
Offensive Security Say – Try Harder!
Offsec students go through hell. They endure levels of stress and frustration beyond what is considered normal...
Terms and Conditions
© Copyright 2015 Offensive Security