Skip to content

n4vn337/get-started-resources

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

GET STARTED RESOURCES

Are you struggling to get good resources for getting into CyberSecurity?? dont worry many of us face this issue. Now the question is where will you find it. And talking frankly no-one can provide you with all buch of information right. SO i have compiled a bunch of different information or resources tha would help you get your way innnn.

So this is it, Get familiar with all and start you hacking journey from here. Everything is provided in step by step manner.

For you to get a good knowledge into cybersec you need to learn few things. The deeper you learn the better CyberSecurity expert you become. What do I have to learn?

  • Programming
  • Linux
  • Networking
  • Web Application Pentesting
  • Network Pentesting

Books To READ

Ill Recommend Papperback Version Books Over Pdf, You can download books using the link below the amazon ones. The amazon links wont die, but the download ones may, so if you find any difficulties downloading the pdf contact me via the methods provided at the last.

(Note: If you are visiting from outside of India just change the url From: amazon.in To : amazon.com or your area domain.)

Programming

We will be using programming to automate our works. Also known as scripting.

Linux

Linux is an extremely popular operating system for hackers. There are two main reasons behind this. First off, Linux's source code is freely available because it is an open source operating system. This means that Linux is very easy to modify or customize. And top of that if you install distro's like Kali or Parrot OS you get a bunch of security tools pre installed. A hacker kit right.

Book Name Amazon Link Direct Download .pdf
The Linux Command Line – A Complete Introduction Amazon Link pdf Link
How Linux Works – What Every Superuser Should Know Paperback Amazon Link pdf Link

Networking

Studying the source code of such tools strongly benefits both attackers and defenders. A network hacker will certainly encounter the libnet library and its derivatives, which let programmers send custom Ethernet frames and IP packets.

Book Name Amazon Link Direct Download .pdf
Computer Networking: A Top-Down Approach Amazon Link pdf Link
Network Warrior 2e Amazon Link pdf Link

Web Application Penetration Testing

A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).

Book Name Amazon Link Direct Download .pdf
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Amazon Link pdf Link
Real-World Bug Hunting: A Field Guide to Web Hacking Amazon Link pdf Link

Network Pentesting

A network penetration test is the process of identifying security vulnerabilities in applications and systems by intentionally using various malicious techniques to evaluate the network's security, or lack of, responses.

Book Name Amazon Link Direct Download .pdf
Penetration Testing – A Hands–On Introduction to Hacking Amazon Link pdf Link
The Hacker Playbook 3: Practical Guide to Penetration Testing Amazon Link pdf Link
Hacking: The Art of Exploitation 2e Paperback Amazon Link pdf Link

More usefull Books

Apparently, the practice of reading books creates cognitive engagement that improves lots of things, including vocabulary, thinking skills, and concentration. It also can affect empathy, social perception, and emotional intelligence, the sum of which helps people stay on the planet longer.

Book Name Amazon Link Direct Download .pdf
Kali Linux Revealed Amazon Link pdf Link
Owasp Testing Guide v4 pdf Link

Sites To SignUp NOW!!!

TryHackMe (CTF) https://tryhackme.com/

HackTheBox (CTF) https://hackthebox.eu/

PortSwigger (web) https://portswigger.net/

BugCrowd (Bug Bounty) https://www.bugcrowd.com/

Hacker1 (Bug Bounty) https://hackerone.com/

Sites for good resources

Vulnhub(vulnerable machines) https://www.vulnhub.com/

GitHub (for resources and tools) https://github.com/

Medium (Blogs) search and read https://medium.com/

Youtube: https://youtube.com/ ippsec JackkTutorials LiveOverflow Hack5 Hackersploit

GOOGLE FOR SURE https://google.com

Benefitial resources

Resources for Beginner Bug Bounty Hunter by @nahamsec https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

Get in touch with me for querries or Suggestions

YouTUBE: https://www.youtube.com/pwnedbyNavneet

twitter: https://twitter.com/n4vn337

Do share this with anyone you find might get help.

THANK YOU <3

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published