#cybersecurity #hacking #penetration-testing
- Fundamentals
- Reconnaissance
- Scanning & Enumeration
- Exploitation Basics
- Capstone Machines:
- Introduction to Exploit Development
- Active Directory:
- Post Exploitation
- Web Application Enumeration
- Testing the Top 10 Web Application Vulnerabilities
- The Bug Hunter's Methodology - https://www.youtube.com/watch?v=uKWu6yhnhbQ
- Nahamsec Recon Playlist- https://www.youtube.com/watchv=MIujSpuDtFY&list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA