Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary 0P3N is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; Cybrary 0P3N provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

Profile image for likhitesh
September 23, 2017
By: Likhitesh
2414

A “Noob’s” Guide to Ransomware
4 Noob’s guide to ransomware DISCLAIMER: For educational and informative purposes only. The author bears no responsibility for any form of usage of the knowledge presented in here. Every one of us has been a victim of at least one computer malware infection at some point in our lives. There is no need to specifically mention the havoc that WannaCry and Peytra ransomware have wrecked lately. With the growing number of hackers worldwide, owing to the ease of accessibility of ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for ajatshatru
September 22, 2017
3465

By: ajatshatru
TOR Browser / Tails OS Setup Virtual Machine, install Linux OS (fully updated and patched) Configure VPN software for hiding your location on your host OS (disable geolocation, clear all log, change your OS default language to some other country) Configure proxy switcher for your tor browser on VM (Linux) Start your TOR browser (Y) Follow all ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for olynch
September 22, 2017
1670

By: Olivia
#hacked  It seems that word of new breaches have been released almost daily as of late. The latest, coming on the back on the devastating Equifax breach, is news that the Securities and Exchange Commission (SEC) was hacked last year. Gulp. The SEC is the top U.S. market’s regulator. Their official website states, “The mission o ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for cmoberly
September 22, 2017
By: initstring
1747

Penetration Testing Flash Applications
Penetration Testing Flash Applications (aka “How to Cheat at Blackjack”) In this post, we will walk through detailed steps to intercept, review, modify and replay flash-based web apps. For demonstration purposes, I’ve selected a blackjack-style card game. We will work to control what cards are dealt, as well as how a score is calculated. The intent of this blog is to demonstrate how a penetration tester would work with a flash app, looking for client-side code that can ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for eddieamell
September 21, 2017
By: eddieamell
1512

How to Open PST Files without Outlook
If the Outlook PST files causing trouble in opening or viewing, then there are very many chances of PST file corruption or it may be due to something else. If those PST files are corrupted or inaccessible than user won’t able to view Emails, Calendars, Contacts, Notes, Tasks and Journal entries etc., and  if those PST files are important to user then he might be having a thought of  repairing them but before going to repair them I would like to ask a question ̶ ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for anomali8888
September 21, 2017
1059

By: anomali8888
Analyze and Visualize Data Android APK with LINT in Python CGI Programming In this brief tutorial, I will show you, step by step, how to analyze an Android APK with Android LINT as well as create a nice graphical output of the result into python CGI web. Note: Make sure you have installed Android LINT (Android SDK) into your operating system ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for sasa1976
September 20, 2017
1480

By: Sasha Radenovic
Regarding Cloud technologies, there are two sides of the story: on the one hand, there are suppliers of new technologies that, as always move forward, and on the other hand, users who do not want to change anything won’t change anything. So let’s try to approach this “problem” with win-win solutions for both sides, but with emphasi ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for jrodspotlight
September 20, 2017
By: Mike Ship
1485

Preventive Security – Alive or Dead
Preventive Security – Alive or Dead There are some new buzz words in the cyber security industry today. Terms such as “data-driven security” and “security analytics” seem to be in the forefront and what all of the “cool” kids are talking about while the “old-timers” dig in and continue to believe that all security problems can be easily solved using customary prevention and detection methods. So who’s right? The answer is, at least to me, they bot ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

A “Noob’s” Guide to Ransomware
Views: 2413 / September 23, 2017
Dark Network Guide!
Views: 3465 / September 22, 2017
UNM4SK3D: SEC, APT33, and CCleaner
Views: 1670 / September 22, 2017
Penetration Testing Flash Applications
Views: 1746 / September 22, 2017
Skip to toolbar
[close]
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel