CTFs and penetration testing guides.
Exploiting Lame in 3 methods without using Metasploit.
Learn to hack into Tony Stark’s machine! You will enumerate the machine, bypass a login portal via SQL injection and gain root access by command injection.
Cracking hashes.