
Penetration testing
Post-Exploitation Using Veil-Pillage
Veil-Pillage is a part of the Veil-Framework which comes handy when performing post-exploitation. It consists of a number of modules which can be used to per

Hacking
PowerShell toolkit: PowerSploit
PowerSploit is a collection of PowerShell scripts which can prove to be very useful during some exploitation and mostly post-exploitation phases of a penetra

Application security
OWASP Practice: Learn and Play from Scratch
OWASP Practice is a virtual environment to help people who want to begin their journey into web application security. Lots of material including videos are a

Penetration testing
Learning how to pentest VPNs with VulnVPN
VulnVPN has been created by the author of http://www.rebootuser.com/ and I must say that it is a very good effort. The goal is to gain root access to a VPN s