Disclaimer: This learning path is intended for educational purposes only. The resources provided here are aimed at helping individuals understand the principles of ethical hacking and cybersecurity. Unauthorized hacking of systems without explicit permission is illegal and unethical. The creator of this content does not endorse or encourage any illegal or malicious activities.
Note: The majority of the resources listed in this learning path are sourced from TryHackMe. Please be aware that TryHackMe and its content are subject to change. It is important to stay updated with their terms of use and guidelines. Any actions taken by individuals based on the information provided in this learning path are at their own risk, and the creator of this content shall not be held liable for any consequences arising from such actions.
Intro
Linux Fundamentals
Windows Fundamentals
Networking
- What is Networking?
- Intro to LAN
- Intro to Networking
- DNS in Detail
- HTTP in Detail
- How Websites Work
- Put it All Together
Discovery/Recon
Exploitation Basics
- Metasploit Intro
- Metasploit Unleashed Playlist
- Blue
- Ice
- Metasploitable 2 Docs
- Linux Privilege Escalation
- Windows 10 Privilege Escalation
Password Cracking
Web Hacking
- Burp Suite Basics
- Burp Suite Repeater
- Web Hacking Tutorial
- Web Exploitation Tutorial
- OWASP Top 10
- OWASP Top 10 2021
- OWASP Juice Shop
- WebGoat
- DVWA
- PortSwigger Web Security
- SQLMap
CTFs
- Vulnversity
- Basic Pentesting
- Kenobi
- Picklerick
- Rrootme
- EasyCTF
- Archangel
- Ignite
- Anthem
- Chocolate Factory
- TeamCW