OffSec
@offsectraining
Empowering the world to fight cyber threats with indispensable cybersecurity skills and resources. Build the path to a secure future with OffSec.
Congratulations, @ProwlSec 👏⛓️💥
Thrilled to share I cleared OSEP at 19! Honored to be among the youngest, thanks to @offsectraining Hard work, PEN-300, and dedication paid off. Tips: Practice labs daily & stay curious! #OSEP #YoungestOSEP #Cybersecurity #EthicalHacking #OffSec #Cybersecurity #redteam
"It's not about having the answers given to you. It's about being willing to explore, to struggle, and learn from setbacks. The answer is often right there, just experiment until you find that breakthrough." 🎧 Want to listen to our latest #TryHarder podcast? Check it out here:…
#BlackHatUSA is just one week away, and we have some spaces remaining in our WEB-300 live training session! 🕷️ As prep for the #OSWE certification, the session will help you to: 🧠 Tackle real-world attack vectors 💥 Exploit misconfigurations and logic flaws 🛠️ Get hands-on with…

🚨 Could you spot a phishing email? Follow “Bad Luck Ben” and “Technical Tina” as they uncover a real-world scenario inside MegaCorp One. You’ll learn: 🎣 How phishing attacks are crafted and executed 🔍 What attackers are looking for (hint: it’s more than your password) ⚠️ The…
Calling all learners in Taiwan! 🚨🇹🇼 We're excited to announce live training sessions in Taiwan, brought to you by OffSec & Devcore (@d3vc0r3), one of our training partners. The sessions, running between August 18 and 22, will cover PEN-300, EXP-401, and WEB-300 ⛓️💥💀🕷️…

✅ Excited to share that I’ve officially passed the OSCP+/OSCP certification!! @offsectraining #OSCP #CyberSecurity #EthicalHacking #OffensiveSecurity #InfoSec #ProfessionalDevelopment
Dragon Drop: this week's NEW releases 🐉🚨🔥 🪲 New CVE labs: → CVE-2025-27636_Attack: lnkd.in/exPHWinw → Defend CVE-2025-27636: lnkd.in/edV-hqbR → CraftStorm_Attack: lnkd.in/eAYZQ9fw → Defend CraftStorm: lnkd.in/eY-z8AVA 🧪 Other new labs: →…
Deep Dive: CVE-2024-12029 (Critical RCE in InvokeAI) ⚠️ CVSS 9.8 | EPSS 61.17% An unprotected API + unsafe torch deserialization = full system takeover. Attackers can host malicious model files and trigger remote code execution via the /api/v2/models/install endpoint. No auth…

🐝⬆️ Ready to level up your OSTH exam prep? Join us for our next #OffSecLive session designed to help you navigate the OSTH exam with clarity and confidence! We’ll break down the exam structure, highlight key topics, and share effective preparation strategies. Learn how to…
#BlackHatUSA is almost here, and seats for our live training sessions are selling fast! 🔥 In partnership with @appliedtechac, our exclusive #BlackHat Training Partner, here are the upcoming sessions: 🐉 PEN-200: offs.ec/40N7Oua 🕷️ WEB-300: offs.ec/4kzBNNr 💀…

How do you evaluate cybersecurity talent today? 👀 “I’ve done privilege escalation.” “I’ve worked on red team projects.” “I perform well under pressure.” You’ve heard it all before. But how do you know it’s true? At OffSec, we focus on showing, not telling. Our labs and…

Introducing our newly improved course pages! 💥 🔗 offs.ec/4kwKrMm We've made it easier to understand what each course offers, how it prepares you for the exam, which job roles it can lead to, and what you can expect from the Learning Library. You'll also find student…
Deep Dive: CVE-2025-27636 (RCE in Apache Camel via Header Filter Bypass) ⚠️ CVSS 5.6 | EPSS 35.5% A case-sensitive header check + exec functionality = remote command execution. Attackers can bypass Camel’s security filters by capitalizing key HTTP headers and execute system…
There are certs. Then there’s OSCE³. 🔗 offs.ec/4eC7B2Q You can earn the OSCE³ automatically once you complete all three of our advanced courses and pass their exams: 🕷️ Advanced Web Attacks and Exploitation (WEB-300) ⛓️💥 Advanced Evasion Techniques and Breaching…

💭 What "Try Harder" really means to us: 🧠 “It’s not just a motto — it’s a mindset" ⬆️ “Persistently showing up" 🙅♀️ “The refusal to seek external help" ⛰️ "The tenacity to keep going when things get tough" 🔗 offsec.com/blog/what-it-m…
Are you an active PEN-200 learner? Level up your OSCP prep with HackTrack with Mentors 🎯 We’re kicking off with the first 200 PEN-200 learners to register. Sign up now: forms.gle/xkKN3di2YS3tVY… More information here: help.offsec.com/hc/en-us/artic…
Deep Dive: CVE-2025-29306 (RCE in FoxCMS via unserialize injection) ⚠️ CVSS 9.8 | EPSS 71.52% No auth. No patch. Just an id parameter passed to unserialize()—and suddenly you’re running system() on the server. Craft a serialized payload, drop it in a URL or curl command, and…

Anyone can polish a resume. Not everyone can pass a 24-hour hands-on exam that simulates real-world attacks under time pressure. That’s why OffSec certifications don’t just show what a candidate knows; they prove what they can do. If they’ve earned an OSCP+, they’ve already…

🚨 Our June 2025 Content & Platform Update! 🔗 offs.ec/448q5Et In case you missed it, here's everything we released last month: 🔥 2 new learning paths: 🔗 offs.ec/4l3p1Yn 🔗 offs.ec/3TkFsU2 🪲 10 new CVE labs 🧠 And lots of new learning content!