Hacking Resources

Get Started. It's Free
or sign up with your email address
Hacking Resources by Mind Map: Hacking Resources

1. Content Creators

1.1. Network

1.1.1. NetworkChuck

1.1.2. David Bombal

1.1.3. Professor Messer

1.2. Pentest

1.2.1. Null Byte

1.2.2. The Cyber Mentor

1.2.3. HackerSploit

1.2.4. Cristi Vlad

1.2.5. Data Zero

1.2.6. DC CyberSec

1.2.7. Black Hills Information Security

1.2.8. Jorge Orchilles

1.2.9. HackHappy

1.2.10. webpwnized

1.2.11. Derek Rook

1.2.12. Codeinstein

1.3. Bug Bounty

1.3.1. STÖK

1.3.2. InsiderPhD

1.3.3. Nahamsec

1.3.4. Bugcrowd

1.3.5. jhaddix

1.3.6. TomNomNom

1.3.7. Brute Logic

1.4. CTF

1.4.1. John Hammond

1.4.2. IppSec

1.4.3. PwnFunction

1.4.4. I.T Security Labs

1.5. Exploit Dev

1.5.1. LiveOverflow

1.5.2. GynvaelEN

1.6. Misc.

1.6.1. I.T. Career Questions

1.6.2. Hak5

1.6.3. Security Weekly

1.6.4. DIGITAL EMPRESS

1.6.5. Pluralsight IT - Training Archive

1.6.6. The Hated One

1.6.7. Wild West Hackin' Fest

1.6.8. Shannon Morse

1.6.9. SheHacksPurple

1.6.10. commaai archive

1.6.11. Simplilearn

1.6.12. The PC Security Channel [TPSC]

1.6.13. F5 DevCentral

1.6.14. 0xdade

1.6.15. Seytonic

1.6.16. Computerphile

1.6.17. DEFCONConference

1.6.18. SANS Institute

1.7. Coding

1.7.1. freeCodeCamp.org

1.7.2. Coding 101

1.7.3. buildwithpython

1.7.4. Engineer Man

1.7.5. Kalle Hallden

1.7.6. Programming with Mosh

1.7.7. Clever Programmer

1.7.8. RC Hackįng Robot - PentestBot

1.7.9. Samy Kamkar

1.7.10. Errichto

2. Certifications

2.1. Network Pentest

2.1.1. Beginner

2.1.1.1. PTS

2.1.1.2. Certified Ethical Hacker (CEH)

2.1.1.3. Pentest+

2.1.1.4. GCIH

2.1.1.5. OSWP

2.1.2. Intermediate

2.1.2.1. OSCP

2.1.2.2. GPEN

2.1.2.3. PTP

2.1.3. Advanced

2.1.3.1. GXPN

2.1.3.2. PTX

2.1.3.3. RastaLabs Overview — Zero-Point Security

2.2. Web App

2.2.1. Beginner

2.2.1.1. eLS WAPT

2.2.1.2. GWAPT

2.2.2. Intermediate/Advanced

2.2.2.1. OSWE

2.2.2.2. WAPTX

2.3. Blue Team

2.3.1. Beginner

2.3.1.1. GCIH

2.3.1.2. CySA+

2.3.1.3. GSEC

2.3.2. Intermediate

2.3.2.1. eLS Threat Hunter

2.3.2.2. GCFA

2.3.3. Advanced

2.4. Exploit Development

2.4.1. Beginner

2.4.1.1. eLS XDS

2.4.2. Intermediate

2.4.2.1. OSCE

2.4.3. Advanced

2.4.3.1. OSEE

2.4.3.2. GREM

2.4.3.3. SANS SEC760

3. Free Training/Resources

3.1. Damn Vulnerable Web App (DVWA) http://www.dvwa.co.uk/

3.2. Lab Resources

3.2.1. OWASP Juice Shop

3.2.2. WebGoat https://owasp.org/www-project-webgoat/

3.2.3. Multillidae https://github.com/webpwnized/mutillidae

3.2.4. Metasploitable https://www.offensive-security.com/metasploit-unleashed/

3.2.5. Vulnhub

3.2.6. Hack The Box

3.2.7. TryHackMe

3.2.8. lab.pentestit.ru

3.3. Metasploitable Linux

3.4. Large Lab Repository

3.4.1. OWASP Vulnerable Web Applications Directory

4. Blogs

4.1. https://brutelogic.com.br/

4.2. Blog - Black Hills Information Security

4.3. 1 Coding Language (Python)

4.4. MalwareTech - Life of a Malware Analyst

4.4.1. Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…

4.5. Home - Active Countermeasures

4.5.1. OWASP Broken Web App

4.6. Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence

4.7. FuzzySecurity | Home

4.8. HighOn.Coffee • Security Research • Penetration Testing Blog

4.9. samsclass.info: Sam Bowne Class Information

4.10. pentestmonkey | Taking the monkey work out of pentesting

5. Foundational

5.1. 1 Scripting Language (BASH)

5.2. Networking

5.2.1. Resources

5.2.1.1. Home - Professor Messer IT Certification Training - CompTIA A+, Network+, Security+

5.2.1.2. itpro.tv

5.2.1.3. cbtnuggets.com

5.2.2. Certifications

5.2.2.1. Network+

5.2.2.2. CCNA (beginner vendor)

5.2.2.3. WCNA

5.3. Operating Systems

5.3.1. Linux

5.3.1.1. Resources

5.3.1.1.1. #1 Learn-by-Doing Online Cloud Training Platform – Linux Academy

5.3.1.1.2. Resources - Linux Foundation - Training

5.3.1.1.3. linuxcommand.org

5.3.1.1.4. https://www.youtube.com/watch?v=bju_FdCo42w&list=PLtK75qxsQaMLZSo7KL-PmiRarU7hrpnwK

5.3.1.1.5. The Complete Linux for Ethical Hackers Course for 2019

5.3.1.1.6. The Complete Linux Course: Beginner to Power User!

5.3.1.1.7. Home | Linux Journey

5.3.1.1.8. Geek's Lesson

5.3.1.1.9. Geek's Lesson

5.3.1.2. Certs

5.3.1.2.1. Linux+

5.3.1.2.2. LPIC certs

5.3.1.2.3. Vendor-certs, such as RedHat

5.3.2. iOS/Android

5.3.2.1. https://www.kali.org/kali-linux-nethunter/

5.3.3. Windows

5.3.3.1. SS64 | Command line reference

5.3.3.2. Command Line Kung Fu

5.4. Coding Language

6. Communities

6.1. Discord

6.1.1. Join the The Cyber Mentor Discord Server!

6.1.2. Join the TryHackMe Discord Server!

6.1.3. Join the Official HackTheBox Discord Discord Server!

6.1.4. Join the MalwareTech Discord Server!

6.1.5. Join the Շђє ๓คภץ ђคՇร Ċ̵͕l̶̀͘u̸̍͝b̵͌͐ Discord Server!

6.1.6. Join the Hacker101 Discord Server!

6.1.7. Join the nahamsec Discord Server!

6.1.8. Join the DeadPixelSec Discord Server!

6.1.9. Join the BasedSec Discord Server!

6.1.10. Join the VulnHub Discord Server!

6.1.11. Join the JHDiscord Discord Server!

6.1.12. Join the Hak5 Discord Server!

6.2. Slack

6.2.1. Slack

6.2.2. https://t.co/6yHoSwGKVH?amp=1

6.2.3. PwnSchool Project on LaunchPass

6.3. MatterMost

6.3.1. Mattermost

6.4. Web

6.4.1. r/netsecstudents

6.4.2. https://www.reddit.com/r/netsecs

6.4.3. r/ExploitDev

6.4.4. r/oscp

6.4.5. r/HowToHack

6.4.6. r/AskNetsec

6.4.7. r/blackhat

6.4.8. r/sysadmin

6.4.9. r/security

6.4.10. r/securityCTF

6.4.11. r/Malware

6.4.12. r/Exploiting

6.4.13. r/ReverseEngineering

7. Misc.

7.1. “I want to learn about exploitation! Where do I start?” https://research.checkpoint.com/wp-content/uploads/2020/03/pwnable_writeup.pdf

8. CTFs

8.1. ctftime.org

8.2. ctf365

8.3. Under the Wire

8.4. XSS game

8.5. smashthestack.org

8.6. overthewire.org/wargames/

8.7. PicoCTF

8.8. ctf101.org

8.9. ctflearn.com

8.10. trailofbits

8.11. CTFChallenge.co.uk

8.12. Telehack

8.13. pwn.college BETA