cs-school
Home
Contact Us
Cloud
Cryptography
CTF
Exploitation
Forensics
Linux
Networking
Programming
Web
Windows
Other
CAPTURE THE FLAG
CTFTime
2024
Hack The Box
Pico CTF
Binary Exploitation
Cryptography
Forensics
General Skills
Big Zip
Binary Search
Binhexa
Blame Game
Collaborative Development
Commitment Issues
Endianness
First Find
Time machine
Super SSH
Repetitions
Reverse Engineering
Bit O Asm 1 2 3 4
GDB baby step 1 2 3 4
Web Exploitation
Inspect HTML
Try Hack Me
Advanced SQL Injection
Advent of cyber 2024
Day 1: Maybe SOC-mas music, he thought, doesn't come from a store
Day 2: One man's false positive is another man's potpourri.
Day 3: Even if I wanted to go, their vulnerabilities wouldn't allow it.
Day 4: I’m all atomic inside!
Day 5: SOC-mas XX-what-ee?
Day 6: If I can't find a nice malware to use, I'm not going.
Day 7: Oh, no. I'M SPEAKING IN CLOUDTRAIL!
Day 15: Be it ever so heinous, there's no place like Domain Controller.
Baselines and Anomalies
CAPA: The Basics
CORS and SOP
Hacking with PowerShell
Intro to Cross-site Scripting
Sch3Ma D3Mon
Shells Overview
SQL Fundamentals
SQL Injection
SQL Injection Lab
SQLMap: The Basics
Windows PowerShell
XSS
Writeups
Cryptohack
Comming Soon...
Prev
Next
CAPA: The Basics
01/02/25
ctf → thm → capa-the-basics
SQLMap: The Basics
31/01/25
ctf → thm → sqlmap-the-basics
SQL Fundamentals
31/01/25
ctf → thm → sql-fundamentals
Powershell
30/01/25
programming → powershell
Your Feedback
Name
Email
Message
Send Feedback
Follow us on X (formerly Twitter)
Join us on Discord
Follow us on Telegram
© 2024 cyberuniversity.tech. All rights reserved.
Term of service,
Privacy Policy