You know the work. Now explain it clearly.
Explain offensive security clearly in interviews, reports, and stakeholder conversations. For people who know the work and want to articulate it with confidence.
Across the full library
44
23 free lessons
10
5 free tracks
9
1 free attack path
23 lessons free. Premium unlocks the full library from $10/month. The communication layer other training platforms leave out.
How it works
Build the understanding first. Then practice the explanation.
Learn what actually matters to explain
Why the attack works, what defenders see, and the depth to handle follow-up questions.
Drill until the words come naturally
Quizzes, flashcards, and briefs so the right term surfaces under pressure.
Practice the interview answer
Every lesson ships with an interview answer, stakeholder explanation, and report-ready language.



Tracks
Structured paths that build depth and explanation skill.
A deliberate sequence of lessons that builds connected understanding, not isolated facts. The core learning experience — start here for structured progression with clear milestones.
Explore Tracks →
Attack Paths
Chain techniques into a full compromise narrative.
The hard interview questions are scenario-based: “walk me through how you would compromise this environment.” Attack Paths chain techniques into an ordered sequence from initial access to objective — the reasoning interviewers listen for.
Explore Attack Paths →Study Kit
Reinforce what you learn. Make it automatic.
Every lesson comes with companion materials built for retention and pressure-proof recall. Together they make the explanation second nature.

Quizzes
Test your reasoning, not just recognition. Can you explain why Kerberoasting targets service accounts, and what a defender would look for?
Flashcards
Build vocabulary so the right term surfaces under pressure. Drill terminology, defender context, and attack rationale.
Briefs
Quick-reference sheets for when you need the key ideas at a glance. One per lesson, built for speed.
Why this platform exists
Why I built ExplainTheHack
I earned the OSCP, OSEP, a CS degree, and spent years in labs and hands-on projects. That work built real skill, but it also exposed a gap I did not expect. My problem was never technical ability: it was explaining what I knew clearly.
ExplainTheHack grew out of years of private notes turned into structured lessons; so people do not just memorize techniques, they learn to understand them and explain them. That is why this platform exists.

OSCP, OSEP, CRTO, CRTE
You already know the material. Now make the explanation second nature.
Structured tracks, study kits, and attack paths. For the next time someone asks you to walk through your methodology, explain a finding clearly, or tell the story of a full compromise.
No credit card required.