-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathhacking.html
More file actions
98 lines (92 loc) · 6.02 KB
/
hacking.html
File metadata and controls
98 lines (92 loc) · 6.02 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title>Hacking</title>
<link rel="stylesheet" href="assets/index.css" />
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.2.1/css/all.min.css">
</head>
<body>
<header class="site-header">
<div class="container header-inner">
<a class="brand" href="index.html">Study-Board</a>
<button id="nav-toggle" class="nav-toggle" aria-label="Toggle navigation">☰</button>
<nav id="site-nav" class="nav" aria-label="Main navigation">
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="quantum.html">Quantum</a></li>
<li><a href="hacking.html">Ethical Hacking</a></li>
</ul>
</nav>
</div>
</header>
<main class="container main-content">
<section class="hero">
<h1>Ethical Hacking & Penetration Testing</h1>
<h2 class="lead">Penetration, Malware, Trojan, Hardware exploitation (Completed 12-week course)</h2>
<p class="lead">Focus on practical labs, CTFs, and Offensive Security tools like Metasploit, Wireshark, and OpenVAS.</p>
<h2 id="deep-dive-certs">🏆 Deep Dive Courses & Certifications</h2>
<p>Advanced learning to move toward professional certification standards.</p>
<ul>
<li>
<a href="https://www.netacad.com/courses/ethical-hacker" target="_blank" rel="noopener"><strong>Cisco Ethical Hacker Course</strong></a>
<span class="muted" style="margin-left: 10px;">Covers scoping, executing, and reporting on vulnerability assessments.</span>
</li>
<li>
<a href="https://www.coursera.org/professional-certificates/ibm-ethical-hacking-with-open-source-tools" target="_blank" rel="noopener"><strong>IBM Ethical Hacking with Open Source Tools Professional Certificate</strong></a>
<span class="muted" style="margin-left: 10px;">Hands-on training with Kali Linux, Wireshark, Metasploit, and OpenVAS.</span>
</li>
<li>
<a href="https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course" target="_blank" rel="noopener"><strong>Practical Ethical Hacking (TCM Security)</strong></a>
<span class="muted" style="margin-left: 10px;">Highly-regarded practical course often aligned with industry-standard methodology.</span>
</li>
</ul>
<h2 id="practice-labs">🧪 Practice Labs & CTF Platforms</h2>
<p>The best way to deepen knowledge is through hands-on practice in controlled environments.</p>
<div class="grid">
<a class="card" href="https://www.hackthebox.com/" target="_blank" rel="noopener">
<strong>Hack The Box (HTB)</strong>
<span>Online platform to test and advance pentesting skills using virtual machines.</span>
</a>
<a class="card" href="https://tryhackme.com/" target="_blank" rel="noopener">
<strong>TryHackMe (THM)</strong>
<span>Beginner-friendly gamified labs with guided learning paths (e.g., Pentester Pathway).</span>
</a>
<a class="card" href="https://www.vulnhub.com/" target="_blank" rel="noopener">
<strong>VulnHub</strong>
<span>Collection of downloadable, purposely vulnerable VMs for offline practice.</span>
</a>
<a class="card" href="https://portswigger.net/web-security/all-labs" target="_blank" rel="noopener">
<strong>Portswigger Web Security Labs (Burp Suite)</strong>
<span>Essential practice for Web Application Hacking (OWASP Top 10 focus).</span>
</a>
</div>
<h2 id="guides">🛠️ Tool & Methodology Guides</h2>
<ul>
<li>
<a href="https://owasp.org/www-project-top-ten/" target="_blank" rel="noopener"><strong>OWASP Top 10 Project</strong></a>
<span class="muted" style="margin-left: 10px;">The definitive guide for understanding and mitigating the most critical web application security risks.</span>
</li>
<li>
<a href="https://docs.metasploit.com/docs/development/getting-started/quick-start.html" target="_blank" rel="noopener"><strong>Metasploit Framework Documentation</strong></a>
<span class="muted" style="margin-left: 10px;">For learning exploitation and post-exploitation techniques (Meterpreter, MSFVENOM).</span>
</li>
<li>
<a href="https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources" target="_blank" rel="noopener"><strong>Ethical Hacking Resources GitHub (Dummy)</strong></a>
<span class="muted" style="margin-left: 10px;">Dummy link to a real-world resource list for scripts, tools, and write-ups.</span>
</li>
</ul>
</section>
</main>
<footer class="site-footer">
<div class="container">
<ul class="footer-links">
<li><a href="https://github.com/Devamm007/" target="_blank" rel="noopener">GitHub <i class="fab fa-github"></i></a></li>
</ul>
<small class="muted">Hacking • Devam Shah • © 2025</small>
</div>
</footer>
<script src="assets/index.js"></script>
</body>
</html>