| 1 |
- My Writeup- How to get started in Cybersecurity
- 2022 Cybersecurity roadmap: How to get started?
|
| 2 |
- My Writeup- Cybersecurity Learning Path
- Cybersecurity Roadmap-By Traw
- Read Ghost in the Wires - My Adventures as the World's Most Wanted Hacker by Kevin Mitnick - Book
|
| 3 |
- Handbook- Cybersecurity Handbook
- Hacking Terminologies
|
| 4 |
- Learn Python
- Learn Javascript
|
| 5 |
- Cybersecurity Mindmap
- Learn Javascript
- JavaScript for Hackers - Video
|
| 6 |
- Writeup - Shell Scripting
- Learn Shell Scripting
|
| 7 |
- Social Engineering (The Art of Human Attack)
- Art of Hacking (Rahul Sasi)
|
| 8 |
- Ethical Hacking Mindmap
- My Writeup- Extension used by Hackers
- Learn Javascript
|
| 9 |
- Writeup- Cyber Security BlueTeam
- Writeup- Footprinting and Reconnaissance
- 5 Useful GitHub Repositories #Shorts
- 3 resources to stay updated with hacking #Shorts
|
| 10 |
|
| 11 |
- Linux Learning
- Linux OS Learning -Video
- Writeups- Linux based
- Follow peoples in Linux Community
|
| 12 |
- Kali Linux Learning
- Kali Linux for Ethical Hackers
- Playlist Video- Kali Linux for Hackers
- Book - Kali Linux Revealed - Mastering the Penetration Testing Distribution
|
| 13 |
- Parrot OS Linux for Ethical Hackers
- Black Arch Linux for Ethical Hackers
- Parrot OS Security - Course
- Detailed Video - BlackArch Linux
|
| 14 |
- Cybersecurity Intro Lab
- Labs on Linux Fundamentals
- Labs on Windows Fundamentals
|
| 15 |
- Network Security Tutorial
- Playlist Video on Network Security
- Writeups on Network Security
- Books on Network Security
|
| 16 |
- Network Security Mindmap
- Lab on Network Fundamentals - TryHackMe
- Lab on Network Fundamentals - HacktheBox
|
| 17 |
- Network Security Workshop
- Security Zines on Network Attacks
- Zines on Computer Networking
|
| 18 |
- Videos - Cloud Security
- Writeup - Cloud Security
- More Dedicated Writeups on Cloud Security
|
| 19 |
- Videos - AWS Cloud Security
- Writeups - AWS Cloud Security
|
| 20 |
- Videos - Azure Cloud Security
- Writeups - Azure Cloud Security
|
| 21 |
- Videos - Web Application Security
|
| 22 |
- Writeups- Web Application Security
|
| 23 |
- How Web Works Mindmap
- Topics to understand Web Application Security
|
| 24 |
- OWASP Top 10 Mindmap
- Videos - OWASP Top 10 Security Risks
|
| 25 |
- Writeups- OWASP Top 10 Security Risks
|
| 26 |
- Topics to understand OWASP Top 10 Security Risks
|
| 27 |
- Learning OWASP Top 10 through Examples
- Learning Several Vulnerabilties through Examples
- Playlist to know about Several Vulnerabilities
|
| 28 |
- Learning Resource of SQL Injection
- Videos - SQL Injection Tutorials
|
| 29 |
- Medium Writeups- SQL Injection
|
| 30 |
- More Writeups on SQL Injection
|
| 31 |
- Learning Resource of Cross Site Scripting (XSS)
- Videos - Cross Site Scripting (XSS)
|
| 32 |
- Writeups Resources on Cross Site Scripting (XSS)
- Medium Writeups - Cross Site Scripting (XSS)
|
| 33 |
- More Writeups on Cross Site Scripting
|
| 34 |
- Learning Resource of Broken Access Control
- Videos - Broken Access Control Tutorials
|
| 35 |
- Writeups Resources on Broken Access Control
- Medium Writeups - Broken Access Control
|
| 36 |
- More Writeups on Broken Access Control
|
| 37 |
- Learning Resource of Cross Site Request Forgery (CSRF)
- Videos - Cross Site Request Forgery (CSRF) Tutorials
|
| 38 |
- Writeups Resources on Cross Site Request Forgery
- Medium Writeups - Cross Site Request Forgery
|
| 39 |
- Security Zines on CSRF
- More Writeups - Cross Site Request Forgery
|
| 40 |
- Learning Resource of Server Side Request Forgery
- Videos - Server Side Request Forgery Tutorials
|
| 41 |
- Writeups Resources on Server Side Request Forgery
- Medium Writeups - Server Side Request Forgery
|
| 42 |
- More Writeups - Server Side Request Forgery
|
| 43 |
- Videos - Insecure Direct Object Reference (IDOR)
|
| 44 |
- Writeups Resources on Insecure Direct Object Reference
- Medium Writeups - Insecure Direct Object Reference (IDOR)
|
| 45 |
- Security Zines on IDOR
- More Writeups - Insecure Direct Object References (IDOR)
|
| 46 |
- Videos - Cross-Origin Resource Sharing (CORS)
|
| 47 |
- Medium Writeups - Cross-Origin Resource Sharing (CORS)
|
| 48 |
- Security Zines on CORS
- More Writeups - Cross-origin resource sharing (CORS)
|
| 49 |
- Video - Basics of Local and Remote File Inclusion
- Videos - Local File Inclusion (LFI)
- Videos - Remote File Inclusion (RFI)
|
| 50 |
- Medium Writeup on LFI & RFI
- Medium Writeups - Local File Inclusion (LFI)
|
| 51 |
- Medium Writeups - Remote File Inclusion (RFI)
|
| 52 |
- Security Zines on LFI & RFI
- More Writeups - Local File Inclusion (LFI)
|
| 53 |
- More Writeups - Remote File Inclusion (RFI)
|
| 54 |
- Learning Resource of XML External Entities (XXE)
- Videos - XML External Entities (XXE) Tutorials
|
| 55 |
- Writeups Resources on XML External Entities (XXE)
- Medium Writeups - XML External Entities (XXE)
|
| 56 |
- Security Zines on XML External Entities (XXE)
- More Writeups on XML External Entities (XXE)
|
| 57 |
- Learning Resource of Buffer Overflow Vulnerability
- Videos - Buffer Overflow Vulnerability
|
| 58 |
- Writeups Resources on Buffer Overflow Vulnerability
- Medium Writeups - Buffer Overflow Vulnerability
|
| 59 |
- More Writeups on Buffer Overflow Vulnerability
|
| 60 |
- Videos - HTTP Request Smuggling
|
| 61 |
- Medium Writeups - HTTP Request Smuggling
|
| 62 |
- Security Zines on HTTP Request Smuggling
- More Writeups on HTTP Request Smuggling
|
| 63 |
- Videos - Carriage Return and Line Feed (CRLF) Injection
- Videos - Lightweight Directory Access Protocol (LDAP) injection
|
| 64 |
- Writeups to Learn Carriage Return and Line Feed Injection
- Writeups to Learn Lightweight Directory Access Protocol Injection
|
| 65 |
- Videos - HTPP Parameter Pollution
|
| 66 |
- Medium Writeups to Learn HTTP Parameter Pollution
|
| 67 |
- Security Zines on HTTP Parameter Pollution
- More Writeups on HTTP Parameter Pollution
|
| 68 |
- Learning Resource for Prototype Pollution
- Videos - Prototype Pollution
|
| 69 |
- Medium Writeups to Learn Prototype Pollution
|
| 70 |
- More Writeups to Learn Prototype Pollution
|
| 71 |
- References & Good Reads for Several Vulnerabilities
|
| 72 |
|
| 73 |
- Medium Writeups on API Security
|
| 74 |
- OWASP API Security Top 10 Mindmap
- More Writeups to learn API Security
|
| 75 |
- Videos - Container Security
|
| 76 |
- Videos - Docker Security
- Videos - Kubernetes Security
|
| 77 |
- Medium Writeups on Container Security
|
| 78 |
- Medium Writeups on Docker Security
- Medium Writeups on Kubernetes Security
|
| 79 |
- More Writeups to Learn Container Security
|
| 80 |
- More Writeups to Learn Docker Security
- More Writeups to Learn Kubernetes Security
|
| 81 |
- References & Good Reads for API Security
|
| 82 |
- References & Good Reads for Docker Security
|
| 83 |
- Videos - Penetration Testing
|
| 84 |
- Medium Writeups on Penetration Testing
|
| 85 |
- More Writeups on Penetration Testing
|
| 86 |
- Videos - Network Penetration Testing
|
| 87 |
- Writeups on Network Penetration Testing
|
| 88 |
- Videos - Web Application Penetration Testing
|
| 89 |
- Medium Writeups on Web Application Penetration Testing
|
| 90 |
- More Writeups on Web Application Penetration Testing
|
| 91 |
- Videos - Thick Client Penetration Testing
|
| 92 |
- Medium Writeups on Thick Client Penetration Testing
|
| 93 |
- More Writeups on Thick Client Penetration Testing
|
| 94 |
- Videos - Wireless Penetration Testing
|
| 95 |
- Medium Writeups on Wireless Penetration Testing
- More Writeups on Wireless Penetration Security
|
| 96 |
- Videos - Andriod Penetration Testing
|
| 97 |
- Medium Writeups on Android Penetration Testing
|
| 98 |
- More Writeups on Android Penetration Testing
|
| 99 |
- Videos - Cloud Penetration Testing
|
| 100 |
- Medium Writeups on Cloud Penetration Testing
|
| 101 |
- More Writeups on Cloud Penetration Testing
|
| 102 |
- Videos - API Penetration Testing
|
| 103 |
- Medium Writeups on API Penetration Testing
|
| 104 |
- More Writeups on API Penetration Testing
|
| 105 |
- Videos - Social Engineering Penetration Testing
|
| 106 |
- More Writeups on Social Engineering Penetration Testing
|
| 107 |
- Videos - Mobile Penetration Testing
|
| 108 |
- Medium Writeups on Mobile Penetration Testing
- More Writeups on Mobile Penetration Security
|
| 109 |
- References & Good Reads for All types of Penetration Testing
|