NEW YORK – July 29, 2020 – Offensive Security, the leading provider of online hands-on training and certification for information security professionals, today announced it has acquired open source security training resource hub VulnHub. The acquisition is part of OffSec’s ongoing mission to provide practical training content to aspiring cybersecurity professionals.
“As part of Offensive Security’s ongoing commitment to community projects, we are excited to add VulnHub to the OffSec family,” said Ning Wang, CEO, Offensive Security. “VulnHub’s mission perfectly aligns with our ethos of providing material that allows anyone to ‘try harder’ by gaining practical, hands-on experience in digital security, computer software and network administration.”
VulnHub is an open source, continually updated catalog of IT assets that are legally hackable, breakable, and exploitable by design. The catalog represents a unique opportunity for security and IT professionals to try their hand at penetration testing in a safe, controlled environment.
All VulnHub content will remain available for free in keeping with OffSec’s commitment to open source. OffSec also provides several other open source tools designed to help security professionals gain hands-on experience, including Kali Linux, Exploit DB, and Metasploit unleashed.
About Offensive Security
Offensive Security is the leading provider of online penetration testing training and certification for information security professionals. Created by the community for the community, Offensive Security’s one-of-a-kind mix of practical, hands-on training and certification programs, virtual labs and open source projects provide practitioners with the highly-desired offensive skills required to advance their careers and better protect their organizations. Offensive Security is committed to funding and growing Kali Linux, the leading operating system for penetration testing, ethical hacking and network security assessments. For more information, visit www.offensive-security.com/and follow @offsectraining and @kalilinux.