skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

LevelUp Library

LevelUp is a free series of online security conferences with content for the hacker and security researcher community.

Why I <3 Offensive Work and Why I </3 Offensive Work

read more

Business Tradecraft for Hackers in the Corporate Industrial Complex

read more

Sticking With It : How To Choose a Target & Stay Motivated

read more

Hackers Don’t Wear Black Hoodies, They Wear Capes

read more

Recognition Primed Bug Bounty Hunting

read more

Hacking Your Resume

read more

Code That Gets You PWN(S|’D)

read more

Hardware Hacking for the Masses (and you!)

read more

Overview of common Android app vulnerabilities

read more

GSuite Security: Everyone wants it but not everyone gets it

read more

REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure

read more

Car Hacking: A College Student’s Perspective

read more

Forget ME, Remember WE. How to hack better with a group

read more

So You Want to Be a Pentester?

read more

Fun with Frida on Mobile

read more

1 Hacker is Good, 2 Hackers are Better – Bug Hunting as a Team

read more

How to Use Zap + using Zap HUD in your browser

read more

Group Hacking a Mini Live Hacking Event

read more

The Diary of an (Inexperienced) Bug Hunter

read more

OWASP Amass – Discovering Internet Exposure

read more
Resource Tile - How does unicode affect our security

How Does Unicode Affect Our Security

read more
Resource Tile - How i Hacked Every Major IDE in 2 weeks

How I Hacked Every Major IDE in 2 Weeks

read more
Resource Tile - Browser Exploitation for Fun and Profit

Browser Exploitation for Fun and Profit

read more
Resource Tile - Targeting for Bug Bounty Research

Targeting for Bug Bounty Research

read more
Resource Tile - Hidden in Plain Site Disclosing Information via Your API

Hidden in Plain Site: Disclosing Information via Your APIs

read more
Resource Tile - Do You Like Fuzzing

Do You Like Fuzzing?

read more
Resource Tile - Identifying & Avoiding Android App Problems

Identifying & Avoiding Android App Protections

read more
Resource Tile - Advanced Android Bug Bounty Skills

Advanced Android Bug Bounty Skills

read more
Resource Tile - Reverse Engineering iOS Mobile Apps

Reverse Engineering iOS Mobile Apps

read more
Resource Tile - Doing Recon Like a Boss

Doing Recon Like A Boss

read more
Resource Tile - Giving Back to the Bug Bounty Community

Giving Back to the Bug Bounty Community

read more
Resource Tile - Breaking Mobile App Protection Mechanisms

Breaking Mobile App Protection Mechanisms

read more
Resource Tile - Esoteric Sub-Domain Enumeration Techniques

Esoteric Sub-Domain Enumeration Techniques

read more
Resource Tile - Car Hacking 101

Car Hacking 101

read more
Resource Tile - Hacking Internet of Things for Bug Bounties

Hacking Internet of Things for Bug Bounties

read more
Resource Tile - Finding Hidden Gems in Old Bug Bounty Programs

Finding Hidden Gems in Old Bug Bounty Programs

read more
Resource Tile - How to Fail at Bug Bounty Hunting

How to Fail at Bug Bounty Hunting

read more
Resource Tile - Bug Boutny Hunting Methodology

Bug Bounty Hunting Methodology v2

read more
Resource Tile - Small Files and Big Bounties, Exploiting Sensitive Files

Small Files and Big Bounties, Exploiting Sensitive Files

read more
Resource Tile - Trickle Down PwnOnomics

Trickle Down PwnOnomics

read more
Resource Tile - Bug Bounty Hunter Methodology v3

Bug Bounty Hunter Methodology v3

read more
Resource Tile - Hacking oAuth 2.0 for Fun and Profit

Hacking oAuth2.0 For Fun and Profit

read more
Resource Tile - Hardware Hacking101

Hardware Hacking 101

read more
Resource Tile - Back to Basics Appsec Practices in Smart Contract Auditing

Back to Basics: Application Security Practices in Smart Contract Auditing

read more
Resource Tile - Meet a Bugcrowd Admin, Twitch

Meet a Bugcrowd Program Admin, Twitch

read more
Resource Tile - Practical Recon Techniques for Bug Hunters& Pen Testers

Practical Recon Techniques for Bug Hunters & Pen Testers

read more
Resource Tile - Why Humans Suck at Calculating Risk and How it Affects Security

How and Why Humans Suck at Calculating Risks

read more
Resource Tile - Serverless Top 10 Vulns

Serverless Top 10 Vulnerabilities

read more
Resource Tile - Profiling the attacker using offender profiling in soc environment

Profiling the Attacker – Using Offender Profiling In SOC Environments

read more
Resource Tile - Behind the curtain safe harbor and the dod

Behind the Curtain: Safe Harbor and Department of Defense

read more
Resource Tile - What you reap is what you sow

A Hackers Contemplation – Where Do We Go From Here?

read more
Resource Tile - AEM hacker approaching adobe experience manager webapps in bug bounty programs

AEM hacker – Approaching Adobe Experience Manager Web Apps

read more
Resource Tile - FInding bugs with binary ninja

Reverse Engineering with Binary Ninja

read more
Resource Tile - From an IVI in a box to a car in a box

From an IVI in a box to a CAR in a box

read more
Resource Tile - IoT Attacker point of view

IoT – Attacker Point of View

read more
Resource Tile - Social Engineering 101

Social Engineering 101

read more
Resource Tile - API Security 101

API Security Testing For Hackers

read more
Resource Tile - Turbo Intruder Abusing HTTP Misfeatures to Accelerate Attacks

Turbo Intruder: Abusing HTTP Misfeatures to Accelerate Attacks by James Kettle

read more
Resource Tile - Bad API, hAPI Hackers

Bad API, hAPI Hackers!

read more
Resource Tile - iPhone Baseband Researcher and Reversing

iPhone Baseband Research + Reversing

read more

What’s in My Hacking Tool Box?

read more
Resource Tile - From CTF to CVE

From Ctf to Cve: How Application of Concepts and Persistence Led to a Vulnerability Disclosure

read more
Resource Tile - The Law and You Reducing the COst of Free Speech

The Law and You: Reducing the Cost of Free Speech

read more

MachO and the AppStore

read more
Back To Top