New course SEC-100: CyberCore - Security Essentials Get equipped with the essential knowledge and hands-on skills needed to launch a successful career in cybersecurity.
Exclusive Hands-on training in live-fire, enterprise environments Use our most powerful cyber range to develop a cyber resilient workforce
Recommended Learn Enterprise Address your talent gap through continuous skills development and knowledge acquisition
New course SEC-100: CyberCore - Security Essentials Get equipped with the essential knowledge and hands-on skills needed to launch a successful career in cybersecurity.
Recommended Learn Enterprise Provide continuous learning and skill development with Learn Enterprise. Access to the entire Learning Library and the Enterprise Cyber Range for everyone on your team.
New course SEC-100: CyberCore - Security Essentials Get equipped with the essential knowledge and hands-on skills needed to launch a successful career in cybersecurity.
Press Release OffSec's Cybersecurity Training Solutions Now Available in AWS Marketplace Through Carahsoft Carahsoft's CarahCloud-Marketplace Program Simplifies Procurement Process for OffSec's Offerings
Post Module Referencea11y.text Post Module Reference Metasploit Post-Exploitation Module Referencea11y.text Metasploit Post-Exploitation Module Reference Metasploit has a wide array of post-exploitation modules that can be run on compromised targets to gather evidence, pivot deeper into a target network, and much more. Windowsa11y.text Windows Post Capture Modules Post Gather Modules Post Manage Modules Linuxa11y.text Linux Post Gather Modules OS Xa11y.text OS X Post Gather Modules Multiple OSa11y.text Multiple OS Post Gather Modules Post General Modules Next Windows Prev Armitage Post Exploitation