Learn by Topic — Redirect to Dedicated Sites
This hub lists every topic. Choose a card to jump to the corresponding site for deep-dives, docs, and sign-ups.
All Topics Click categories to expand
Program & Continuous
Adversary Emulation & Red Team
-
Red Team
Objective-driven adversary emulation.
-
Assumed-Breach Assessment
Seeded access to measure lateral movement.
-
Ransomware Emulation (Benign)
Validate detections safely.
-
EDR / Defender Evasion
AMSI/ETW blind spots & OPSEC.
-
Social Engineering & Phishing
Phish, vish, smish with metrics.
-
Physical Red Team
Facilities, locks, badges, tailgating.
Application & API
OWASP-Focused
-
OWASP Top 10 (Web)
Assessment aligned to A01–A10.
-
OWASP API Security Top 10
API-centric risks and defenses.
-
OWASP Mobile Top 10
Platform misuse & storage/transport.
-
OWASP ASVS Gap Assessment
Map your app to ASVS controls.
-
OWASP MASVS (Mobile)
MASVS-aligned testing + MSTG.
-
OWASP Proactive Controls
Developer enablement.
-
GraphQL Security Review
Schema & resolver abuse.
Identity, Network & Cloud
Platforms & Specializations
AI & Recon
Reverse Engineering
Research, Collaboration & Enablement
-
Exploit Research
Vulnerability research & PoCs.
-
Malware Simulation
Benign payloads for validation.
-
Purple Team
Red + Blue collaboration.
-
CTF & Labs
Coaching, workshops & events.
-
Training Hub
High-level hub (you’re here).
-
Freelance Consulting
On-demand experts.
-
Projects
Case studies, tools & highlights.
-
DFIR & Forensics
Response & analysis.
Popular Learning Paths
Exploit Development Path
Vulnerability Research → Buffer Overflow Exploits → Exploit Writing → Post-Exploitation.
Start Learning →
Penetration Testing Expert
Recon → Exploitation → Post-Exploitation → Reporting → Retesting.
Start Learning →
Network Security Expert
Packet Analysis → VPN Bypass → MITM Attacks → Network Intrusion Detection.
Start Learning →
Web Application Security Mastery
XSS → SQLi → CSRF → Insecure Deserialization → Web Shells.
Start Learning →
Mobile Application Security
Static and Dynamic Analysis → Reverse Engineering → iOS/Android Testing.
Start Learning →
IoT Security Specialist
IoT Penetration Testing → Device Hacking → Network Exploits → Firmware Reverse Engineering.
Start Learning →
Reverse Engineering Mastery
Binary Analysis → Malware Reversing → Static/Dynamic Analysis → Vulnerability Discovery.
Start Learning →
Advanced Malware Analysis
Malware Obfuscation → Static/Dynamic Analysis → Sandbox Evading Techniques → Exploit Crafting.
Start Learning →
OSINT Expert
Open Source Intelligence → Social Engineering → Dark Web Scraping → Data Leak Hunting.
Start Learning →
Digital Forensics Mastery
Incident Response → Disk & Memory Forensics → Malware Analysis → Chain of Custody.
Start Learning →
Linux Security Specialist
Linux Privilege Escalation → Kernel Exploits → Linux Hardening Techniques.
Start Learning →
About the Academy Hub
This is a directory only. Each topic card opens the specialized site where content, demos, and sign-ups live.