Hi, this is Sarthak and I'm a lead maintainer of this project. For further questions or general security information catch me on Twitter at smash8tap or you can always find me in the chat during Michael's twitch stream.
A collection of awesome ethical hacking security related content!
Each Section has a Learning and a Test Your Knowledge path, and if you follow the learning path in the order that is listed, then you shall be able to solve the challenges in the Test your knowledge path.
(Work in Progress)
Learning
- Linux Fundamentals series by Tryhackme
- Tryahackme: Bash Scripting A walkthrough room to learn basics of Bash Scripting
- Bash Scripting and linux Basics Learn basic shell scripting and some more useful linux commands
- Regular Expressions Learn how to use regular expressoins
- Linux Find Command Tryhackme room to learn linux find command
- Nullbyte Linux Basics Learn linux-basics by reading these awesome articles which includes command-line basics to all the way over to linux boot process
- Kali Linux Revealed A free course by Offensive Security, which will teach you about kali and linux in general
Test your knowledge
- Overthewire: Bandit Test all that you have learnt so far by completing these Linux challenges
- Tryhackme: Linux Modules Learn and test your linux command-line skills (tr, awk, xargs, etc)
Learning
- Introductory Networking Room by Tryhackme, to learn about the basics of networking
Learning
(Linux Basics are required)
- Nmap Basics Learn how to do various types of scans and how to use nmap's scripting engine
- Directory Enumeration Learn how to perform web fuzzing with Wfuzz
- Ffuf Learn how to use Fuff for web directory enumeration
- Metasploit Learn how to launch an exploit and get a shell using metasploit
- Metasploit Unleashed A free course developed by Offensive Security, which teaches you everything you need to know about metasploit.
- Password Cracking: Learn basics of password cracking
- Hydra Learn a versatile logon cracker
- John and SSH Crack Private SSH keys with Johntheripper
- Brute force SSH Learn how to brute force ssh credentials with nmap, hydra and metasploit
- INE Starter Pass Learn basics of Penetration testing with Elearn-Security's Junior Penetration testing path for free.
- Cheatsheet: Red Team An awesome cheatsheet to look for while on an actual pentest
Test Your Knowledge
- Tryhackme Rooms
- Tryhackme: Crackthehash Use your password-cracking skills to crack various hash types like md5, sha-512 etc
- Tryhackme: Blue A walkthrough based room, where you hack into a vulnerable windows machine using metasploit
- Tryhackme: Vulnversity Use your recon and privilege escalation skill to hack into this machine
- Tryhackme: Basic Pentesting Perform a basic Pentest in a lab environment and sharpen your skills learnt so far
- Tryhackme: Linux Agency Test your Linux understanding and basic privilege escalation techniques
- Pentestit Perform an actual Pentest and root the machine in this black-box pentesting labs
- Cyberseclabs Learn linux and windows exploitation in a lab environment
Learning
-
Liveoverflow Binary Exploitation An awesome Youtube playlist describing about Binary Exploitation and Memory Corruption.
-
Nightmare's Binary Exploitation An in-depth guide to learn the basics of reverse engineering and binary exploitation along with various tools like gdb, Ghidra, etc.
-
Pwn college An in-depth and thorough lecture series by Arizona State University
-
Malware Unicorn Learn basics of reverse engineering with hands-on workshop
- Reverse Engineering 101 Learn basics of Windows PE program, x86 assembly language and some reverse engineering tools
- Reverse Engineering 102 Learn Anti Reverse Engineering techniques including encrytion, VM evasion and Packing.
-
Radare2book Learn everything about the reverse engineering framework tool Radare2
-
Nightmare Binary Exploitation Course Learn basics of Binary exploitation and reverse engineering
-
Bartosz Wójcik Reverse engineering, antidebugging, polymorphic encryption, assembly programming, malware analysis
- Reverse engineering tools review Advantages and disadvantages, alternative solutions.
- Windows Hot Patching Mechanism Explained Low-level technical analysis of Windows hot-patching feature.
- Assembly code size optimization tricks How to make you shellcodes smaller?
- How to write a CrackMe for a CTF competition A tutorial of how to write a CTF crackme in C++.
- Polymorphic Encryption Algorithms A tutorial of how to write a polymorphic engine in C++ & assembly.
- Anti reverse engineering. Malware vs Antivirus Software Techniques that make it difficult to reverse-engineer malware (malicious software).
- DLL Libraries API Hooking Intercepting DLL libraries calls. API hooking in practice.
- Assembly programming basics When and how to use an x86 assembler
- Anti-cracking protections for programmers How to make cracker's life harder.
-
Linux System Call Table Useful when you are trying to write a shell code
-
x86 Assembly Guide Learn the basics of 32-bit x86 Assembly programming.
-
Pwntools Tutorial Learn how to automate binary exploitation with pwntools
-
Binexp tutorials Learn binary exploitation from following this awesome tutorials from Georgia Institute of Technology
Test You Knowledge
-
Pwn College CTF by Arizona State University
-
Micro Corruption CTF Solve various challenges exploiting the code on MSP430 chip
-
Exploit Education: Nebula Exploit common weaknesses like SUID files permissions, buffer overflows, $PATH weaknesses
-
ROP Emporium Learn return-oriented programming through a series of challenges
-
Cyberdefenders RE101 Binary Analysis challenges
(Work in Progress)
(Work in Progress)
(Work in Progress)
(Work in Progress)
(Work in Progress)