update lists

This commit is contained in:
2025-07-18 22:22:32 +02:00
parent 55bed3b4a1
commit 5916c5c074
3078 changed files with 331679 additions and 357255 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Cyber Security University !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
 Awesome Cyber Security University !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
▐ A curated list of awesome and free educational resources that focuses on learn by doing.
@@ -34,12 +34,18 @@
Cyber Security University is A curated list of awesome and free educational resources that focus on learning by doing.
There are 6 parts to this. Introduction and Pre-security, Free Beginner Red Team Path, Free Beginner Blue Team Path, Bonus practices/latest CVEs and Extremely Hard rooms to do. The tasks are linear in nature of the difficulty. So it's 
recommended to do it in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
There are 6 parts to this. 
1. Introduction and Pre-security
2. Free Beginner Red Team Path
3. Free Beginner Blue Team Path
4. Bonus practices
5. Latest CVEs
6. Extremely Hard rooms
The tasks are linear in nature of the difficulty. So it's recommended to do it in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
As you go through the curriculum, you will find completion badges that are hidden within this README.md (https://github.com/brootware/Cyber-Security-University/blob/main/README.md) for both red and blue team path completion badges. You 
can copy the HTML code for them and add it to the content page below once you have completed them.
As you go through the curriculum, you will find completion badges that are hidden within this README.md (https://github.com/brootware/Cyber-Security-University/blob/main/README.md) for both red and blue team path completion badges. You can copy 
the HTML code for them and add it to the content page below once you have completed them.
↑ (#contents)
@@ -63,6 +69,7 @@
⟡ Principles of security () - Principles of security.
⟡ Red Team Engagements () - Intro to red team engagements.
⟡ Hip Flask (https://tryhackme.com/room/hipflask) - An in-depth walkthrough covering pentest methodology against a vulnerable server.
⟡ Practice Linux Commands (https://labex.io/courses/linux-basic-commands-practice-online) - A free course with 41 hands-on labs to practice and master the most commonly used Linux commands.
Introductory CTFs to get your feet wet
@@ -87,6 +94,7 @@
⟡ Linux Privesc () - Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available.
⟡ Red Team Fundamentals () - Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements.
⟡ Red Team Recon () - Learn how to use DNS, advanced searching, Recon-ng, and Maltego to collect information about your target.
⟡ Nmap Tutorials (https://labex.io/tutorials/quick-start-with-nmap-free-tutorials-400132) - Learn and practice the basics of network scanning using Nmap.
Red Team Intro CTFs
@@ -129,7 +137,7 @@
Level 5 - Reverse Engineering & Pwn
⟡ Intro to x86 64 () - This room teaches the basics of x86-64 assembly language.
⟡ Windows x64 Assembly () - Introduction to x64 Assembly on Windows.
⟡ CC Ghidra () - This room teaches the basics of ghidra.
⟡ CC Radare2 () - This room teaches the basics of radare2.
⟡ Reverse Engineering () - This room focuses on teaching the basics of assembly through reverse engineering.
@@ -197,8 +205,8 @@
⟡ Hunt Conti with Splunk (https://tryhackme.com/room/contiransomwarehgh) - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
⟡ Hunting for Execution Tactic (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).
⟡ Hunting for Credential Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).
⟡ Hunting for Persistence Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2) - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting workshop covering the topic of
adversarial persistence (TA0003).
⟡ Hunting for Persistence Access
 (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2) - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting workshop covering the topic of adversarial persistence (TA0003).
⟡ Hunting for Defense Evation (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Defense Evasion (TA0005).
@@ -207,6 +215,8 @@
Level 3 - Beginner Forensics, Threat Intel & Cryptography
⟡ Threat Intelligence 101 () - Introduction to Cyber Threat Intelligence.
⟡ Threat Intelligence Tools () - Explore different OSINT tools used to conduct security threat assessments and investigations.
⟡ Martryohka doll () - Beginner file analysis challenge.
⟡ The Glory of the Garden () - Beginner image analysis challenge.
⟡ Packets Primer () - Beginner packet analysis challenge.
@@ -343,3 +353,5 @@
↑ (#contents)
cybersecurityuniversity Github: https://github.com/brootware/awesome-cyber-security-university