Submit your favorite resources for free.

Submit
LogoHackDB
  • Recent
  • Pricing
  • Submit
LogoHackDB

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  1. Home
  2. Items
  3. GIAC GPEN
icon of GIAC GPEN

GIAC GPEN

The GPEN certification validates a professional's ability to conduct penetration tests using best-practice techniques and methodologies.

Visit WebsiteShare on X
image of GIAC GPEN
Visit Website

Introduction

Back

Information

  • Publisher
    Admin
  • Websitewww.giac.org
  • Created date03/31/2025
  • Published date03/31/2025

Categories

  • Certifications
  • Red Team Operations

Tags

  • Certifications

More Resources

  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    Training
    image of IronPE
    Exploit DevelopmentInfrastructure SecurityRed Team Operations
    Visit Website

    IronPE

    Details

    Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.

    Internal
    image of Lab401
    Wireless SecurityPhysical SecurityRed Team OperationsReverse Engineering
    Visit Website

    Lab401

    Details

    Premier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.

    WirelessPhysicalInternal
    image of Swarmer
    Red Team OperationsInfrastructure Security
    Visit Website

    Swarmer

    Details

    Convert registry exports into NTUSER.MAN hive files to stealthily inject HKCU keys without admin rights, bypassing EDR/AV registry API monitoring.

    Internal

    The GIAC Penetration Tester (GPEN) certification assesses a cybersecurity professional's knowledge and skills in penetration testing. It covers essential areas such as:

    • Comprehensive Pen Test Planning: Covering scoping and reconnaissance techniques.
    • In-Depth Scanning and Exploitation: Including post-exploitation and pivoting methods.
    • Password Attacks: Covering various password attack methods and defenses.
    • Azure Integration and Attacks: Understanding Azure applications and attack strategies.

    GPEN certification holders demonstrate the ability to conduct exploits, perform detailed reconnaissance, and utilize a process-oriented approach to penetration testing projects. It also includes CyberLive, hands-on practical testing.