Instructions:

  1. The resources given here covers most of the topics one need to learn. Try to complete as much portion as possible and then we can work together to advance further in the topics.
  2. Knowledge of a programming knowledge is must (python or any other language) + bash**.** We mostly need to know about scripting using python or any other languages. Along side a language one need to know basics of bash. Check out the Programming
  3. You should be familiar with the linux operating system. Just know the basics like bash commands and .sh files.
  4. Most of the problems in cybersecurity requries that you understand the flow and what a program is trying to do, so you need one language in which you can write your scripting tools (python here) + basic bash and basic understandings of what any language program is doing by seeing its codes. So open github and open any repository of a language of what you don’t know and try to see if you are able to get what the code is trying to do. (You don’t have to learn the language but practice whether you can identify the work flow and logic of the program.)
  5. After completing the previous step you are now good to solve some CTF challenges. CTF have different varieties of topics such as steganography, cryptography, program exploits, app-specific exploits (web, email, file sharing), reverse engineering, forensics, programming, and penetration testing challenges. Then try to upsolve some easy problems at

picoCTF - CMU Cybersecurity Competition

Learning this much is enough for now, we will share more content later

Programming

Youtubers

  1. LiveOverflow: (for critical analysis view of vulnerabilities and techniques. Pwn playlist is more than enough for basic binary exploitation.)
  2. GynvaelEN, Ippsec (for writeups and walkthroughs) [John Hammand for simpler version.]
  3. BlackHat (for topic selection and interesting findings)
  4. pwn.college
  5. Chris Greer (for wireshark and network related topics)
  6. Paweł Łukasik (for Reverse Eng. )
  7. NahamSec (for Recon based tools and bugbounty)