cs-school
Home
Contact Us
Cloud
Cryptography
CTF
Exploitation
Forensics
Linux
Networking
Programming
Web
Windows
Other
CAPTURE THE FLAG
CTFTime
2024
Hack The Box
Pico CTF
Binary Exploitation
Cryptography
13
Forensics
Verify
General Skills
Big Zip
Binary Search
Binhexa
Blame Game
Collaborative Development
Commitment Issues
Endianness
First Find
Time machine
Super SSH
Repetitions
Reverse Engineering
Bit O Asm 1 2 3 4
GDB baby step 1 2 3 4
Web Exploitation
Inspect HTML
Try Hack Me
Advanced SQL Injection
Advent of cyber 2024
Day 1: Maybe SOC-mas music, he thought, doesn't come from a store
Day 2: One man's false positive is another man's potpourri.
Day 3: Even if I wanted to go, their vulnerabilities wouldn't allow it.
Day 4: I’m all atomic inside!
Day 5: SOC-mas XX-what-ee?
Day 6: If I can't find a nice malware to use, I'm not going.
Day 7: Oh, no. I'M SPEAKING IN CLOUDTRAIL!
Day 15: Be it ever so heinous, there's no place like Domain Controller.
Baselines and Anomalies
CAPA: The Basics
CORS and SOP
FlareVM: Arsenal of Tools
Hacking with PowerShell
Intro to Cross-site Scripting
REMnux: Getting Started
Sch3Ma D3Mon
Shells Overview
SQL Fundamentals
SQL Injection
SQL Injection Lab
SQLMap: The Basics
Windows PowerShell
XSS
Writeups
Cryptohack
Comming Soon...
Prev
Next
Latest posts
Installation & Setup
05/03/25
programming → python → python-basics → installation-and-setup
Introduction to Python
05/03/25
programming → python → python-basics → introduction-to-python
13
05/03/25
ctf → pico-ctf → cryptography → 13
Verify
03/03/25
ctf → pico-ctf → forensics → verify
Your Feedback
Name
Email
Message
Send Feedback
Follow us on X (formerly Twitter)
Join us on Discord
Follow us on Telegram
© 2024 cyberuniversity.tech. All rights reserved.
Term of service,
Privacy Policy