In other words, this is my hacking notebook where I write down all notes from my journey in cybersecurity.
🌟 Recognized by Intigriti, issued in #108 edition of Bug Bytes
- Web
- Pwn
- Exploit development
- Common Vulnerabilities and Exposures
- Password Cracking
- Bind Shells (Unix)
- Reverse Shells (Unix)
- Reverse Shells (Windows)
- Linux Privilege Escalation
- TODO: Windows Privilege Escalation
- Tools
- Scanning for vulnerabilities with nmap
- How to use ffuf
- Tips and tricks for chrome devtools
- TODO: Kiterunner for API testing
- TODO: Docker for Hackers
- Mobile
- Programming fundamentals and principles
- Design Patterns
- TODO: Data Structures
- TODO: Algorithms
- TODO: Bitwise Operations
- TODO: Object Oriented Programming
- TODO: The SOLID Principle
- TODO: REST style architecture
- TODO: Big O notation
- Scripting
- Bash Basics
- TODO: Bash Advanced
- TODO: Python for Penetration Testing
- TODO: Javascript for Hackers
- Networking
- Subnet cheatsheet
- TODO: Packet Capturing
- TODO: SSH
- TODO: SMB
- TODO: FTP
- Wireless
- Privacy and anonymity
- Useful onion links
- How to make an .onion website
- TODO: PGP and email privacy
- TODO: Secure file sharing
- TODO: XMPP messaging
- TODO: TAILS
- TODO: QuebesOS
Below are some of the amazing teachers who gave me all this knowledge:
- Jason Haddix - The Bug Hunter Methodology V4
- Heath Adams - Practical Ethical Hacking - The Complete Course
- Cristi Vlad - Recon in Cybersecurity
- Michael Skelton - How to Master FFUF for Bug Bounties and Pen Testing
- Katie Paxton-Fear, Top 10 API Bugs (and Where to Find Them)
- Somdev Sangwan - AwesomeXSS
- Bucky Roberts - WiFi Wireless Security
- Filedescriptor, Ron Chan, EdOverflow and their Reconless Youtube Channel
- TryHackMe, HackTheBox
- SCSP Community - Cyber-Sec-Resources
- OnceUpon - Bash-Oneliner