Skip to content

pathakabhi24/Learn-Hacking-365-Days-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 

Repository files navigation

Learn365

This repository contains all the information shared during my Learn 365 days Challenge. Learn 365 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for the whole year, it can be anything from infosec to general life. Follow me on Twitter for Regular Updates: Abhinav Pathak. That type of stuffs are shared by some people on the Internet but they share some Intermediate and Advanced steps of Hacking. I thought I can do this for Beginners who want to make career in this field. So this challenge will help them.


S.NO Mind Map
1 Cybersecurity Mindmap
2 Ethical Hacking Mindmap
3 Network Security Mindmap
4 How Web Works Mindmap
5 OWASP Top 10 Mindmap
6 OWASP API Security Top 10 Mindmap
7 Pentesting Methodology -Tasks
7 Pentesting Methodology -Commands
8 Cloud Pentest Mindmap
9 Internal Network Pentest Mindmap
10 Active Directory Penetration Testing Resources Mindmap
11 API Pentesting Mindmap

Day Topic
1
  • My Writeup- How to get started in Cybersecurity
  • 2022 Cybersecurity roadmap: How to get started?
2
  • My Writeup- Cybersecurity Learning Path
  • Cybersecurity Roadmap-By Traw
  • Read Ghost in the Wires - My Adventures as the World's Most Wanted Hacker by Kevin Mitnick - Book
3
  • Handbook- Cybersecurity Handbook
  • Hacking Terminologies
4
  • Learn Python
  • Learn Javascript
5
  • Cybersecurity Mindmap
  • Learn Javascript
  • JavaScript for Hackers - Video
6
  • Writeup - Shell Scripting
  • Learn Shell Scripting
7
  • Social Engineering (The Art of Human Attack)
  • Art of Hacking (Rahul Sasi)
8
  • Ethical Hacking Mindmap
  • My Writeup- Extension used by Hackers
  • Learn Javascript
9
  • Writeup- Cyber Security BlueTeam
  • Writeup- Footprinting and Reconnaissance
  • 5 Useful GitHub Repositories #Shorts
  • 3 resources to stay updated with hacking #Shorts
10
  • Learn Ethical Hacking
11
  • Linux Learning
  • Linux OS Learning -Video
  • Writeups- Linux based
  • Follow peoples in Linux Community
12
  • Kali Linux Learning
  • Kali Linux for Ethical Hackers
  • Playlist Video- Kali Linux for Hackers
  • Book - Kali Linux Revealed - Mastering the Penetration Testing Distribution
13
  • Parrot OS Linux for Ethical Hackers
  • Black Arch Linux for Ethical Hackers
  • Parrot OS Security - Course
  • Detailed Video - BlackArch Linux
14
  • Cybersecurity Intro Lab
  • Labs on Linux Fundamentals
  • Labs on Windows Fundamentals
15
  • Network Security Tutorial
  • Playlist Video on Network Security
  • Writeups on Network Security
  • Books on Network Security
16
  • Network Security Mindmap
  • Lab on Network Fundamentals - TryHackMe
  • Lab on Network Fundamentals - HacktheBox
17
  • Network Security Workshop
  • Security Zines on Network Attacks
  • Zines on Computer Networking
18
  • Videos - Cloud Security
  • Writeup - Cloud Security
  • More Dedicated Writeups on Cloud Security
19
  • Videos - AWS Cloud Security
  • Writeups - AWS Cloud Security
20
  • Videos - Azure Cloud Security
  • Writeups - Azure Cloud Security
21
  • Videos - Web Application Security
22
  • Writeups- Web Application Security
23
  • How Web Works Mindmap
  • Topics to understand Web Application Security
24
  • OWASP Top 10 Mindmap
  • Videos - OWASP Top 10 Security Risks
25
  • Writeups- OWASP Top 10 Security Risks
26
  • Topics to understand OWASP Top 10 Security Risks
27
  • Learning OWASP Top 10 through Examples
  • Learning Several Vulnerabilties through Examples
  • Playlist to know about Several Vulnerabilities
28
  • Learning Resource of SQL Injection
  • Videos - SQL Injection Tutorials
29
  • Medium Writeups- SQL Injection
30
  • More Writeups on SQL Injection
31
  • Learning Resource of Cross Site Scripting (XSS)
  • Videos - Cross Site Scripting (XSS)
32
  • Writeups Resources on Cross Site Scripting (XSS)
  • Medium Writeups - Cross Site Scripting (XSS)
33
  • More Writeups on Cross Site Scripting
34
  • Learning Resource of Broken Access Control
  • Videos - Broken Access Control Tutorials
35
  • Writeups Resources on Broken Access Control
  • Medium Writeups - Broken Access Control
36
  • More Writeups on Broken Access Control
37
  • Learning Resource of Cross Site Request Forgery (CSRF)
  • Videos - Cross Site Request Forgery (CSRF) Tutorials
38
  • Writeups Resources on Cross Site Request Forgery
  • Medium Writeups - Cross Site Request Forgery
39
  • Security Zines on CSRF
  • More Writeups - Cross Site Request Forgery
40
  • Learning Resource of Server Side Request Forgery
  • Videos - Server Side Request Forgery Tutorials
41
  • Writeups Resources on Server Side Request Forgery
  • Medium Writeups - Server Side Request Forgery
42
  • More Writeups - Server Side Request Forgery
43
  • Videos - Insecure Direct Object Reference (IDOR)
44
  • Writeups Resources on Insecure Direct Object Reference
  • Medium Writeups - Insecure Direct Object Reference (IDOR)
45
  • Security Zines on IDOR
  • More Writeups - Insecure Direct Object References (IDOR)
46
  • Videos - Cross-Origin Resource Sharing (CORS)
47
  • Medium Writeups - Cross-Origin Resource Sharing (CORS)
48
  • Security Zines on CORS
  • More Writeups - Cross-origin resource sharing (CORS)
49
  • Video - Basics of Local and Remote File Inclusion
  • Videos - Local File Inclusion (LFI)
  • Videos - Remote File Inclusion (RFI)
50
  • Medium Writeup on LFI & RFI
  • Medium Writeups - Local File Inclusion (LFI)
51
  • Medium Writeups - Remote File Inclusion (RFI)
52
  • Security Zines on LFI & RFI
  • More Writeups - Local File Inclusion (LFI)
53
  • More Writeups - Remote File Inclusion (RFI)
54
  • Learning Resource of XML External Entities (XXE)
  • Videos - XML External Entities (XXE) Tutorials
55
  • Writeups Resources on XML External Entities (XXE)
  • Medium Writeups - XML External Entities (XXE)
56
  • Security Zines on XML External Entities (XXE)
  • More Writeups on XML External Entities (XXE)
57
  • Learning Resource of Buffer Overflow Vulnerability
  • Videos - Buffer Overflow Vulnerability
58
  • Writeups Resources on Buffer Overflow Vulnerability
  • Medium Writeups - Buffer Overflow Vulnerability
59
  • More Writeups on Buffer Overflow Vulnerability
60
  • Videos - HTTP Request Smuggling
61
  • Medium Writeups - HTTP Request Smuggling
62
  • Security Zines on HTTP Request Smuggling
  • More Writeups on HTTP Request Smuggling
63
  • Videos - Carriage Return and Line Feed (CRLF) Injection
  • Videos - Lightweight Directory Access Protocol (LDAP) injection
64
  • Writeups to Learn Carriage Return and Line Feed Injection
  • Writeups to Learn Lightweight Directory Access Protocol Injection
65
  • Videos - HTPP Parameter Pollution
66
  • Medium Writeups to Learn HTTP Parameter Pollution
67
  • Security Zines on HTTP Parameter Pollution
  • More Writeups on HTTP Parameter Pollution
68
  • Learning Resource for Prototype Pollution
  • Videos - Prototype Pollution
69
  • Medium Writeups to Learn Prototype Pollution
70
  • More Writeups to Learn Prototype Pollution
71
  • References & Good Reads for Several Vulnerabilities
72
  • Videos - API Security
73
  • Medium Writeups on API Security
74
  • OWASP API Security Top 10 Mindmap
  • More Writeups to learn API Security
75
  • Videos - Container Security
76
  • Videos - Docker Security
  • Videos - Kubernetes Security
77
  • Medium Writeups on Container Security
78
  • Medium Writeups on Docker Security
  • Medium Writeups on Kubernetes Security
79
  • More Writeups to Learn Container Security
80
  • More Writeups to Learn Docker Security
  • More Writeups to Learn Kubernetes Security
81
  • References & Good Reads for API Security
82
  • References & Good Reads for Docker Security
83
  • Videos - Penetration Testing
84
  • Medium Writeups on Penetration Testing
85
  • More Writeups on Penetration Testing
86
  • Videos - Network Penetration Testing
87
  • Writeups on Network Penetration Testing
88
  • Videos - Web Application Penetration Testing
89
  • Medium Writeups on Web Application Penetration Testing
90
  • More Writeups on Web Application Penetration Testing
91
  • Videos - Thick Client Penetration Testing
92
  • Medium Writeups on Thick Client Penetration Testing
93
  • More Writeups on Thick Client Penetration Testing
94
  • Videos - Wireless Penetration Testing
95
  • Medium Writeups on Wireless Penetration Testing
  • More Writeups on Wireless Penetration Security
96
  • Videos - Andriod Penetration Testing
97
  • Medium Writeups on Android Penetration Testing
98
  • More Writeups on Android Penetration Testing
99
  • Videos - Cloud Penetration Testing
100
  • Medium Writeups on Cloud Penetration Testing
101
  • More Writeups on Cloud Penetration Testing
102
  • Videos - API Penetration Testing
103
  • Medium Writeups on API Penetration Testing
104
  • More Writeups on API Penetration Testing
105
  • Videos - Social Engineering Penetration Testing
106
  • More Writeups on Social Engineering Penetration Testing
107
  • Videos - Mobile Penetration Testing
108
  • Medium Writeups on Mobile Penetration Testing
  • More Writeups on Mobile Penetration Security
109
  • References & Good Reads for All types of Penetration Testing

About

This repository is about sharing knowledge of Hacking to Beginners and is dedicated to @i_amsphinx 365 days of Learning and the Tweets collection.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published