Basics & Foundations
• Networking → go.netacad.com
• Linux → linuxjourney.com
• Bash → gnu.org/software/bash/manual
• Python → learnpython.org
Web Fundamentals
• HTTP → developer.mozilla.org
• Web Security → owasp.org/www-project-top-ten
• APIs → rapidapi.com/learn
Pentesting Platforms (Hands-on)
• TryHackMe → tryhackme.com
• Hack The Box → hackthebox.com
• PortSwigger Labs → portsweigger.net/web-security
• PicoCTF → picoctf.org
Tools & Practice
• Nmap → nmap.org/book
• Burp Suite → portsweigger.net/burp/documentation
• Metasploit → metasploit.help.rapid7.com
• Wireshark → wireshark.org/docs
Exploitation & Advanced
• Privilege Escalation → gtfobins.github.io
• Reverse Engineering → crackmes.one
• Binary Exploitation → pwn.college
• Malware Analysis → malware-traffic-analysis.net
Bug Bounty & Real World
• HackerOne → hackerone.com/hackers
• Bugcrowd → bugcrowd.com
• Pentest Reports → pentestreports.com
Cloud & DevSecOps
• AWS Security → aws.amazon.com/training
• Azure Security → microsoft.com/learn/azure
• Kubernetes Security → kubernetes.io/docs
Career & Roadmaps
• Roadmap → roadmap.sh/cyber-security
• Certifications → eJPT, PNPT, OSCP
• Writeups → medium.com/infosec blogs