An interactive and guided skills development platform for corporate teams looking to master offensive, defensive, and general security domains.
Comprehensive cybersecurity education platform designed for academic institutions to prepare students for real-world challenges.
Self-paced learning platform with hands-on labs and structured content to help you master cybersecurity skills.
Our NIS2 compliance solution includes:
Case Study: Jacob Masse passed eJPT, eWPT & eCPPT
Jacob Masse, a cybersecurity enthusiast, shares his journey of passing the eJPT, eWPT, and eCPPT certifications with the help of Parrot CTFs.
Read Case StudyA collection of cheat sheets for various hacking techniques and tools.
Hang out
21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware
View vulnerability reportJoin our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.
Get started with Parrot CTFsWe’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.
Read more news
Parrot CTFs helps companies across Europe meet and maintain NIS2 compliance through trusted, transparent, and repeatable penetration testing. Get detailed audit-ready reports, real-world risk insights, and full lifecycle support.
Our NIS2 compliance solution includes:
Case Study: Jacob Masse passed eJPT, eWPT & eCPPT
Jacob Masse, a cybersecurity enthusiast, shares his journey of passing the eJPT, eWPT, and eCPPT certifications with the help of Parrot CTFs.
Read Case StudyA collection of cheat sheets for various hacking techniques and tools.
Hang out
21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware
View vulnerability reportJoin our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.
Get started with Parrot CTFsWe’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.
Read more newsThe shell is a fundamental tool for interacting with operating systems, providing a command-line interface for executing commands, running scripts, and managing system resources.
General
Fundamentals
A shell is a command-line interface (CLI) used to interact with the operating system. It allows users to execute commands, run scripts, and manage system resources. Shells can be used for a variety of tasks, including file manipulation, program execution, and system administration. This is where you will spend 90% of your time as an ethical hacker you will be modifying files, running hacking tools, managing compromised machines all through the CLI.
There are a few different shells you may come across:
By understanding and utilizing different shells, you can optimize your workflow, enhance your productivity, and improve your overall efficiency as an ethical hacker. This foundational knowledge is a critical skill in the field of cybersecurity. We will primarily focus on the bash shell as it is the most common shell used in the internet today.
What does the Bash Shell look like? 