
Sep 1, 2023
September 2023 Content & Platform Update
Welcome to the OffSec September 2023 content update! Find the full scoop inside.
The OffSec Learning Library (OLL) continues to evolve nearly daily in response to the dynamic cybersecurity landscape. With each passing month, the OLL deepens in specialized knowledge and broadens in diverse cybersecurity topics.
This month, we’re proud to introduce a selection of 17 brand-new Learning Modules that further equip individuals and organizations with the most comprehensive and up-to-date cybersecurity learning resources available.
For those committed to building resilient software, these modules address common vulnerabilities and best practices:
- Credential Attacks for Developers
- Password Reset Vulnerabilities for Developers
- Cryptography for Web Developers
For those who specialize in identifying and exploiting vulnerabilities, these modules offer insights into advanced offensive techniques and the attacker’s mindset:
- Process Injection for Red Teamers
- Impairing Event Tracing for Windows (ETW) in User Mode
- Impairing Event Tracing for Windows (ETW) in Kernel Mode
- Windows Event Log Tampering Techniques
- Attacking Active Directory
- Hands-on SQL Injection with Python
- Firmware Analysis Basics
- Automated Firmware Unpackers
- Introduction to Embedded Systems
Navigate the complexities of cloud environments and continuous integration/continuous deployment with:
- Attacking CI/CD – Leaked Secrets to Poisoned Pipeline
- Attacking CI/CD – Insufficient Flow Control
- Attacking CI/CD – Dependency Chain Abuse
Sharpen your defensive skills and stay ahead of threats with modules focused on protection, detection, and response:
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Insights
OffSec’s Take on the Global Generative AI Adoption Index
Discover OffSec’s take on the latest Global Generative AI Adoption Index report released by AWS.
May 30, 2025
3 min read

Research & Tutorials
CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint.
May 29, 2025
2 min read

Insights
Recompiling Your “Self”: A Cybersecurity-Inspired Guide to Resilience
A recap of our mental health OffSec LIVE session, with tips on ensuring intentional change, self-awareness, and digital resilience in cybersecurity.
May 28, 2025
8 min read