💢c1b3r n0t3s

Search

SearchSearch
        • BabyEncription
        • The Last Dance
        • Insomnia
        • jscalc
        • No Threshold
        • Pentest Notes
        • Accenture CTF
        • KPMG CTF
        • VarGroup CTF
          • Elixir Emporium
          • Embassy
          • Mirror Witch
          • ClockWork Gurdian
          • Dragon Flight
          • Dragon Fury
          • Enchanted Cipher
          • The Summoner's Incantation
          • A new Hire
          • Cave Expedition
          • silent_trap
          • Thorin’s Amulet
          • Echoes in Stone
          • The Ancient Citadel
          • The Hillside Haven
          • The Mechanical Bird's Nest
          • The Poisoned Scroll
          • The Shadowed Sigil
          • The Stone That Whispers
          • EncryptedScroll
          • SealedRune
          • Cyber Attack
          • Eldoria Panel
          • Trial by Fire
          • Whispers of the Moonbeam
            • MiniMax
            • Replacement
            • El teteo
            • Forbidden Manuscript
            • Graverobber
            • Mathematrics
            • Phantom's Script
            • Sp00ky Theme
            • The Shortcut Haunting
            • Unholy Union
            • Void Whispers
        • Character
        • Flag Command
        • Getting started
        • Labyrinth
        • Stop, Drop & Roll
        • TimeKORP
        • Bug Bounty Methodology tricks 🍥
        • CVEs 💸
        • Leaked credentials 🔐
        • Methodology & Theory🍓
        • Tools I use for Pentesting 🌀
        • Useful Web Browser Extensions 🍪
        • Vulnerabilities to find 🚀
        • Joomla 🦁
        • SweetRice 🐉
        • ClipBucket
        • CVE-2014-6271
        • CVE-2021-38647
        • CVE-2021-41773
        • CVE-2024-25600
        • JuicyPotato (Windows PrivEsc)
        • PrintSpoofer (SeImpersonate Priviledge on Windows)
        • Restaurant Management System
        • sar2html RCE
        • WebMin 1.890 RCE
            • Aplicaciones de Escritorio con Python 🔋
            • Biblioteca estándar y herramientas adicionales 🐝
            • Colecciones y Estructuras de datos en Python 🍍
            • Conceptos básicos de Python 🚜
            • Entrada y salida de datos 🥝
            • Manejo de librerías comunes 🦤
            • Módulos y paquetes en Python 🐡
            • POO 🍌
            • Python Ofensivo 🦭
          • Broken Authentication Theory 🐛
          • Bug Bounty Hunting Process 🐐
          • Command Injections 🍘
          • File Inclusion Theory 🍥
          • File Upload Attacks Theory 💣
          • Footprinting Theory 🌚
          • Getting started in Pentesting 🫎
          • Hacking Wordpress Theory 🍅
          • HTTP Headers 🎻
          • HTTP Request Methods 🧿
          • Introduction to Active Directory (AD) 🐟
          • JavaScript Deobfuscation 🎸
          • Login Brute Forcing 🦏
          • Network Enumeration with Nmap 🪩
          • Penetration Testing Process 🐻‍❄️
          • Server Side Attacks Theory 🗺️
          • Session Security Theory 🦤
          • SQLi Fundamentals 🐢
          • Vulnerability Assessment 🐖
          • Web Attacks 🐊
          • Web Services & API Fundamentals 🧨
          • XSS Theory 🍣
            • About Kali Linux 🍳
            • Configuring Kali Linux 🛸
            • Debian Package Management 🎙️
            • Getting started with Kali Linux ⚡
            • Helping yourself and getting help 🌀
            • Installing Kali Linux ✏️
            • Linux Fundamentals 🦜
            • Securing and Monitoring Kali Linux 🔒
          • CSRF Theory
          • NoSQL Injection Theory 🍄
          • Path Traversal Theory 🌵
          • Sql Injection Theory 🩸
          • SQLi Cheatsheet ❤️‍🔥
            • Python Useful Commands ⚕️
        • Create a Kali docker container for Pentesting 🐉
        • Cybersecurity Blogs 🦭
        • Hacking Forums 🐦‍🔥
        • HTTP status codes complete list 💨
        • Intro to Docker 🐳
        • Learning Roadmap
        • Public wordlists from data breaches & Data leaks 🐃
        • vHosts vs Subdomains 💿
        • XXE payloads🪗
        • Check the integrity of an iso image 🤢
        • Find files in Linux 🍑
        • Linux `.services` 😜
        • Linux backdoors 🚪
        • Linux file permissions 🐵
        • Modern Linux Backdooring 🦝
        • PrivEsc Linux 🐱
        • Protonvpn from cli 🥣
        • Share files in Linux 🍉
        • Some Linux cheatsheet commands 👾
        • Understand passwd file in Linux 🧠
        • Unix Environment Variables 🌋
        • Malware Development Essentials ☠️
        • Miners ⚒️
        • High DPI Screen Configurations (2k or more)
        • Setting up batcat
        • EndeavourOS 🐧
          • SQLi hashbypass 🎳
          • SQLi Logic 👅
          • SQLi Payloads 🦊
          • payloadbox XSS Payload List 🥝
        • Strange port redirects 😒
        • DNS 🐍
        • FTP 🐐
        • IMAP/POP3 🍖
        • IPMI 🍗
        • NFS 🌻
        • Oracle TNS
        • RDP 📺
        • Rsync 🐄
        • SMB/CIFS 🐿
        • SMTP 🐅
        • SNMP 🍍
        • SSH 🔓
        • WinRM 🐓
        • WMI 🍋‍🟩
        • Creating a VPN ✳️
            • Advanced C2 Setups 🌠
            • C2 Operations Basics 📲
            • Command and Control Framework Structure 📐
            • Command, Control and Conquer 🎥
            • Common C2 Frameworks 🏕
            • Setting up a C2 Framework 🕌
            • Campaign Planning 🧮
            • Concept of Operations ⚙️
            • Defining Scopes and Objectives 🎯
            • Engagement Documentation 📒
            • Mission Plan 🚀
            • Operations Plan 💡
            • Resource Plan 📑
            • Rules of Engagement 📘
            • Engagement Structure 👨‍🔧
            • Red team Engagements 🫀
            • Teams and Functions of and Engagement 🧑‍⚖️
            • Vulnerability Assessment and Penetration Tests Limitations 👹
            • Countermeasures 🧾
            • Introduction 🅰️
            • Practical Example 🧪
            • Risk Assesment 🪃
            • Threat Analysis 🚸
            • Vulnerability Analysis 🧩
            • Applying Threat Intel to Red Team ❗️
            • Other Red Team Applications of CTI 🔎
            • TIBER-EU Framework 🔫
            • TTP Mapping 🧲
            • What is Threat Intelligence 🔦
            • Introduction 🗽
            • Offline Attacks 🏎
            • Online Password Attacks 🏯
            • Password Attacking Techniques 🚗
            • Password Profiling 🚔
            • Password Spray Attack 🎢
            • Choosing a phishing domain 🦥
            • Droppers 🐦‍⬛
            • Intro to Phishing Attacks 🦜
            • Phishing Infrastructure 🪻
            • Using Browser Exploits 🕷
            • Using GoPhish 🪐
            • Using Microsoft Office in Phishing 🐾
            • Writing Convincing Phishing Emails 🦫
            • Advanced Searching 🐢
            • Built-in Tools 🐔
            • Maltego 🦔
            • Recon-ng 🦥
            • Specialized Search Engines 🦃
            • Taxonomy of Reconnaissance 🐙
            • An HTML Application (HTA) 💉
            • Command and Control (C2 or C&C) 🧬
            • Delivery Techniques 🧼
            • Introduction to Weaponization 🧿
            • Powershell (PSH) 🎁
            • Visual Basic for Application (VBA) 🔮
            • Windows Scripting Host (WSH) 🪤
            • Conclusion 🧅
            • DNS, SMB and SNMP 🍇
            • Introduction 🫐
            • Linux Enumeration 🍳
            • More Tools for Windows 🍌
            • Purpose 🌶
            • Windows Enumeration 🧊
            • 1. Introduction 🚜
            • 2. Moving Through the Network 🚢
            • 3. Spawning Processes Remotely 🚤
            • 4. Moving Laterally using WMI ⛽️
            • 5. Use of Alternate Authentication Material 🗼
            • 6. Abusing User Behaviour 🌠
            • 7. Port Forwarding 🚁
            • 8. More tools and techniques 🎠
            • Active Directory (AD) Environment 📀
            • Applications and services 💥
            • Host Security Solutions 🌀
            • Network Infraestructure 🧠
            • Network Security Solutions 🧑🏻‍⚖️
            • Users and Groups Management 👥
            • 1. Tampering with Unprivileged Accounts 🥙
            • 2. Backdooring Files 🏐
            • 3. Abusing Services 🚝
            • 4. Abusing Scheduled Tasks 🚑
            • 5. Logon Triggered Persistence 🚇
            • 6. Backdooring the Login Screen (RDP) 📡
            • 7. Persisting through existing services ☎️
            • 8. Other persistence techniques 📟
            • 1. Windows Privilege Escalation 🤹
            • 2. Harvesting Passwords from Usual Spots 🎸
            • 3. Other Quick Wins 🚑
            • 4. Windows Services 🎺
            • 5. Abusing dangerous privileges 🎪
            • 6. Abusing vulnerable software 🎭
            • 7. Tools for the trade 🏎
        • Find piHoles
        • Linux pam Backdoor
        • List all content recursively (tree alternative)
        • md5 number generator
        • Mnemonic
        • nodejsshell
        • 7zip 🔇
        • ASCII text signature generator 🎴
        • BurpSuite 📙
        • Chisel 🦦
        • cURL ⚙️
        • dig 🍑
        • Dirb 📢
        • dirsearch 📁
        • DNSEnum 🍈
        • Exiftool 🐧
        • FFMPeg 🚍
        • Ffuf 🐳
        • Gobuster 🐦
        • GoSpider 🐚
        • Greenbone (OpenVAS) 🌶️
        • Hydra 🐍
        • IDA 👠
        • John The Ripper 🐈‍⬛
        • Msfvenom 🕸️
        • Netcat 😼
        • Nikto 🐱
        • Nmap 👁️‍🗨️
        • OWASP ZAP 🦈
        • ReconSpider 🧟
        • Shodan ⭕
        • Socat 🐱
        • Sqlmap 🪲
        • Vi 👮
        • Vim 🛹
        • Volatility cheatsheet 🦷
        • Wafw00f 🐺
        • Wfuzz 🐙
          • Awesome Intune Blogs 🗿
          • Create .intunewin packages 📦
          • Java OpenJDKs for Intune ☕
        • Check integrity of an iso image 👻
        • Obtain WiFi keys on cmd 👽
        • Windows Cheat Sheet
        • Windows remote desktop 🖥
        • Wscripts (.vba, .vbe or .txt scripts) 💷
      • AppArmor 🛡️
      • Brute force 🏴‍☠️
      • Buffer Overflow 🌄
      • Crack Password Hashes (Sites) 🤡
      • Docker hacking 🐳
      • Esoteric languages 💢
      • Exploiting Cron Jobs 🎀
      • Exploiting Shellshock 🗿​
      • File Sharing 🌶️
      • Fingerprinting 🫐
      • Google Dorking 👓
      • H2 databases 🥁
      • IDOR ㊗️
      • Import a .asc key ♻️
      • Jenkins 👨‍🎓
      • JWT tokens 🐧
      • Kernel exploitation 🍀
      • Keycloak 🗝️
      • LFI 🎃
      • Logs 🤠
      • lxd 👁
      • Malware Reversing 🐉
      • MongoDB 🥒
      • MSSQL 📬
      • Mysql 💟
      • Neo4j (cypher) Injections ☎️
      • Nodejs
      • OSINT 👻
      • Php things 🐘
      • phpmyadmin 🦧
      • Postgresql 🧭
      • ProFtpd ⚕️
      • Redis database 🦈
      • Reverse shells 👾
      • robots.txt 🤖
      • Samba shares 🗂️
      • Spectrograms 🥠
      • SQLi 💉
      • Steganografy notes 🐅
      • Strange privesc on Linux 🍄
      • Subdomain enumeration 🌞
      • Tomcat 🐱
      • Tools webpages 🐚
      • Translation and Shifting (Format encoding) 🥭
      • Tunneling 🚡
      • Turn usb into rubber ducky 🐥
      • Useful scripts 🌊
      • Web Enumeration 🐏
      • Web Services Attacks 💣
      • WiFi Hacking 🌐
      • Wordpress 🍔
      • WSDL 🚀
      • XSS attacks 💀
      • Zabbix 🚛
            • Alert
            • Analytics
            • Antique
            • Bank
            • Bashed
            • Beep
            • Bizness
            • Blocky
            • BoardLight
            • Broker
            • Busqueda
            • Cap
            • Chemistry
            • Code
            • Codify
            • CozyHosting
            • Devvortex
            • Dog
            • Editorial
            • EscapeTwo
            • GreenHorn
            • Headless
            • Horizontall
            • Inject
            • Irked
            • Keeper
            • Knife
            • Lame
            • LinkVortex
            • Mirai
            • MonitorsTwo
            • Nibbles
            • Nocturnal
            • NodeBlock
            • Nunchucks
            • Perfection
            • PermX
            • Pilgrimage
            • Planning
            • Precious
            • Sau
            • Sea
            • Secret
            • Shocker
            • Sightless
            • Titanic
            • TwoMillion
            • Underpass
            • Usage
            • Validation
            • Wifinetic
            • Writeup
            • Blurry
            • Builder
            • Cypher
            • Environment
            • Heal
            • Instant
            • MonitorsThree
            • Strutted
            • Adventure Time 🐢
            • Daily Bugle 🕷️
            • Internal ⚙️
            • Year of the dog 🐶
            • Airplane ✈️
            • Cybercrafted 🌲
            • StuxCTF 🧬
    Home

    ❯

    notes

    ❯

    Info

    ❯

    Learning Roadmap

    Learning Roadmap

    Jun 03, 20251 min read

    My cybersecurity Learning Roadmap:

    CertificationLink¿Completed?
    CBBH✅
    CPTS❌
    OSCP❌
    WIFI Modules on HTB❌
    Certified Wifi Challenge❌
    ARTE❌

    Graph View

    Backlinks

    • No backlinks found

    Comments

    Created with Quartz v4.2.3 © 2025

    • GitHub
    • LinkedIn
    • Twitter
    • TryHackMe
    • HackTheBox