Because Education should be free.
There are 3 parts to this. Free Beginner Red Team Path, Free Beginner Blue Team Path and Extremely Hard rooms to do. The tasks are linear in nature of difficulty. So it's recommended to do in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
To get started, Click on Use this template button. Mark the tasks you have completed as below
- [x] OpenVPN <https://tryhackme.com/room/openvpn>
It will look like this.
As you go through the curriculum, you will find completion badges that are hidden within this README.md
for both red and blue team path completion badges. You can copy the html code for them and add it into the content page below once you have completed them.
Pull requests are welcome with the condition that the resource should be free!
Paths | Completion |
---|---|
Introduction and Pre-Security | (Completed/In Progress) |
Free Beginner Red Team Path | (Add your badge here. Badge code is hidden in this repo) |
Free Beginner Blue Team Path | (Add your badge here. Badge code is hidden in this repo) |
Extremely Hard Rooms to do | (Completed/In Progress) |
- OpenVPN https://tryhackme.com/room/openvpn
- Welcome https://tryhackme.com/jr/welcome
- Intro to Researching https://tryhackme.com/room/introtoresearch
- Learn Linux https://tryhackme.com/room/zthlinux
- Pentesting fundamentals https://tryhackme.com/room/pentestingfundamentals
- Principles of security https://tryhackme.com/room/principlesofsecurity
- Red Team Engagements https://tryhackme.com/room/redteamengagements
- Crash Course Pentesting https://tryhackme.com/room/ccpentesting
Introductory CTFs to get your feet wet
- Google Dorking https://tryhackme.com/room/googledorking
- OHsint https://tryhackme.com/room/ohsint
- Shodan.io https://tryhackme.com/room/shodan
- Tmux https://tryhackme.com/room/rptmux
- Nmap https://tryhackme.com/room/rpnmap
- Web Scanning https://tryhackme.com/room/rpwebscanning
- Sublist3r https://tryhackme.com/room/rpsublist3r
- Metasploit https://tryhackme.com/room/rpmetasploit
- Hydra https://tryhackme.com/room/hydra
- Linux Privesc https://tryhackme.com/room/linuxprivesc
- Web Scanning https://tryhackme.com/room/rpwebscanning
- Red Team Fundamentals https://tryhackme.com/room/redteamfundamentals
- Red Team Recon https://tryhackme.com/room/redteamrecon
Red Team Intro CTFs
- Vulnversity - https://tryhackme.com/room/vulnversity
- Blue - https://tryhackme.com/room/blue
- Simple CTF https://tryhackme.com/room/easyctf
- Bounty Hacker https://tryhackme.com/room/cowboyhacker
- Crack the hash https://tryhackme.com/room/crackthehash
- Agent Sudo https://tryhackme.com/room/agentsudoctf
- The Cod Caper https://tryhackme.com/room/thecodcaper
- Ice https://tryhackme.com/room/ice
- Lazy Admin https://tryhackme.com/room/lazyadmin
- Basic Pentesting https://tryhackme.com/room/basicpentestingjt
- OWASP top 10 https://tryhackme.com/room/owasptop10
- Inclusion https://tryhackme.com/room/inclusion
- Injection https://tryhackme.com/room/injection
- Vulnversity https://tryhackme.com/room/vulnversity
- Basic Pentesting https://tryhackme.com/room/basicpentestingjt
- Juiceshop https://tryhackme.com/room/owaspjuiceshop
- Ignite https://tryhackme.com/room/ignite
- Overpass https://tryhackme.com/room/overpass
- Year of the Rabbit https://tryhackme.com/room/yearoftherabbit
- DevelPy https://tryhackme.com/room/bsidesgtdevelpy
- Jack of all trades https://tryhackme.com/room/jackofalltrades
- Bolt https://tryhackme.com/room/bolt
- Intro to x86 64 https://tryhackme.com/room/introtox8664
- CC Ghidra https://tryhackme.com/room/ccghidra
- CC Radare2 https://tryhackme.com/room/ccradare2
- CC Steganography https://tryhackme.com/room/ccstego
- Reverse Engineering https://tryhackme.com/room/reverseengineering
- Reversing ELF https://tryhackme.com/room/reverselfiles
- Dumping Router Firmware https://tryhackme.com/room/rfirmware
- Intro to pwntools https://tryhackme.com/room/introtopwntools
- Pwnkit: CVE-2021-4034 https://tryhackme.com/room/pwnkit
- Sudo Security Bypass https://tryhackme.com/room/sudovulnsbypass
- Sudo Buffer Overflow https://tryhackme.com/room/sudovulnsbof
- Windows Privesc Arena https://tryhackme.com/room/windowsprivescarena
- Linux Privesc Arena https://tryhackme.com/room/linuxprivescarena
- Windows Privesc https://tryhackme.com/room/windows10privesc
- Blaster https://tryhackme.com/room/blaster
- Ignite https://tryhackme.com/room/ignite
- Kenobi https://tryhackme.com/room/kenobi
- Capture the flag https://tryhackme.com/room/c4ptur3th3fl4g
- Pickle Rick https://tryhackme.com/room/picklerick
- Insecure Kubernetes https://tryhackme.com/room/insekube
- The Great Escape (docker) https://tryhackme.com/room/thegreatescape
- Solr Exploiting Log4j https://tryhackme.com/room/solar
Congratulations!! If you have finished until here. You deserve a badge! Put this in your writeups or git profile. You can continue doing the below CTFs.
Click here to get your red team badge!
Copy below and add it to your forked github repo
<a href="https://github.com/brootware/Cyber-Security-University"><img src="https://img.shields.io/badge/Completed-Red%20Team%20Path-red" /></a>
- Post Exploitation Basics https://tryhackme.com/room/postexploit
- Smag Grotto https://tryhackme.com/room/smaggrotto
- Inclusion https://tryhackme.com/room/inclusion
- Dogcat https://tryhackme.com/room/dogcat
- LFI basics https://tryhackme.com/room/lfibasics
- Buffer Overflow Prep https://tryhackme.com/room/bufferoverflowprep
- Overpass https://tryhackme.com/room/overpass
- Break out the cage https://tryhackme.com/room/breakoutthecage1
- Lian Yu https://tryhackme.com/room/lianyu
- Attacktive Directory https://tryhackme.com/room/attacktivedirectory
- Retro https://tryhackme.com/room/retro
- Blue Print https://tryhackme.com/room/blueprint
- Anthem https://tryhackme.com/room/anthem
- Relevant https://tryhackme.com/room/relevant
- Windows Fundamentals https://tryhackme.com/room/windowsfundamentals1xbx
- Nessus https://tryhackme.com/room/rpnessusredux
- Mitre https://tryhackme.com/room/mitre
- Yara https://tryhackme.com/room/yara
- OpenVAS https://tryhackme.com/room/openvas
- Intro to Honeypots https://tryhackme.com/room/introductiontohoneypots
- Volatility https://tryhackme.com/room/bpvolatility
- Red Line https://tryhackme.com/room/btredlinejoxr3d
- Autopsy https://tryhackme.com/room/autopsy2ze0
- Investigating Windows https://tryhackme.com/room/investigatingwindows
- Juicy Details https://tryhackme.com/room/juicydetails
- Carnage https://tryhackme.com/room/c2carnage
- Squid Game https://tryhackme.com/room/squidgameroom
- Splunk Boss of the SOC V1 https://tryhackme.com/room/bpsplunk
- Splunk Boss of the SOC V2 https://cyberdefenders.org/blueteam-ctf-challenges/16
- Splunk Boss of the SOC V3 https://cyberdefenders.org/blueteam-ctf-challenges/8
- Martryohka doll https://play.picoctf.org/practice/challenge/129?category=4&page=1&solved=0
- Glory of the Garden https://play.picoctf.org/practice/challenge/44?category=4&page=1&solved=0
- Packets Primer https://play.picoctf.org/practice/challenge/286?category=4&page=2&solved=0
- Wireshark doo doo doo https://play.picoctf.org/practice/challenge/115?category=4&page=1&solved=0
- Wireshark two two two https://play.picoctf.org/practice/challenge/110?category=4&page=1&solved=0
- Trivial flag transfer protocol https://play.picoctf.org/practice/challenge/103?category=4&page=1&solved=0
- What Lies within https://play.picoctf.org/practice/challenge/74?category=4&page=2&solved=0
- Illumination https://app.hackthebox.com/challenges/illumination
- Emo https://app.hackthebox.com/challenges/emo
- Obsecure https://app.hackthebox.com/challenges/obscure
- Bucket - Cloud Security Forensics https://cyberdefenders.org/blueteam-ctf-challenges/84
- Sleuthkit Intro https://play.picoctf.org/practice/challenge/301?category=4&page=2&solved=0
- Reminiscent https://app.hackthebox.com/challenges/reminiscent
- Hunter - Windows Disk Image Forensics https://cyberdefenders.org/blueteam-ctf-challenges/32
- Spotlight - Mac Disk Image Forensics https://cyberdefenders.org/blueteam-ctf-challenges/34
- Ulysses - Linux Disk Image Forensics https://cyberdefenders.org/blueteam-ctf-challenges/41
- Banking Troubles - Windows Memory Image Forensics
- Detect Log4J https://cyberdefenders.org/blueteam-ctf-challenges/86
- History of Malware https://tryhackme.com/room/historyofmalware
- Malware Introduction https://tryhackme.com/room/malmalintroductory
- Basic Malware Reverse Engineering https://tryhackme.com/room/basicmalwarere
- Intro Windows Reversing https://tryhackme.com/room/windowsreversingintro
- Windows x64 Assembly https://tryhackme.com/room/win64assembly
- JVM reverse engineering https://tryhackme.com/room/jvmreverseengineering
- Get PDF (Malicious Document) https://cyberdefenders.org/blueteam-ctf-challenges/47
Congratulations!! If you have finished until here. You deserve a badge! Put this in your writeups or git profile. You can continue doing the below CTFs.
Click here to get your blue team badge!
Copy below and add it to your forked github repo
<a href="https://github.com/brootware/Cyber-Security-University"><img src="https://img.shields.io/badge/Completed-Blue%20Team%20Path-blue" /></a>
- Ra https://tryhackme.com/room/ra
- Ra2 https://tryhackme.com/room/ra2
- Osiris https://tryhackme.com/room/osiris
- CCT2019 https://tryhackme.com/room/cct2019
- Set https://tryhackme.com/room/set
- Theseus https://tryhackme.com/room/theseus
- IronCorp https://tryhackme.com/room/ironcorp
- Carpe Diem 1 https://tryhackme.com/room/carpediem1
- Borderlands https://tryhackme.com/room/borderlands
- Jeff https://tryhackme.com/room/jeff
- Year of the Owl https://tryhackme.com/room/yearoftheowl
- Anonymous Playground https://tryhackme.com/room/anonymousplayground
- EnterPrize https://tryhackme.com/room/enterprize
- Racetrack Bank https://tryhackme.com/room/racetrackbank
- Python Playground https://tryhackme.com/room/pythonplayground