A comprehensive TryHackMe learning path with organized sections on Introductory Rooms, Linux Fundamentals, Networking, Forensics, CTF challenges, Scripting, and more. This repo provides a structured approach to mastering cybersecurity skills through TryHackMe.
☆301Sep 21, 2024Updated last year
Alternatives and similar repositories for TryHackMe-Learning-Path-From-Beginner-to-Expert
Users that are interested in TryHackMe-Learning-Path-From-Beginner-to-Expert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- COMPLETE OSINT CHEAT-SHEET☆124Oct 19, 2025Updated 5 months ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- Need help finding what room to do next if grinding points?☆55Oct 20, 2024Updated last year
- Some notes written during my OSCP Journey (KeepNote project)☆11Mar 2, 2020Updated 6 years ago
- ☆22Aug 16, 2025Updated 7 months ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆42Feb 20, 2026Updated last month
- Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical fin…☆54Oct 12, 2025Updated 5 months ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆109Updated this week
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Study notes from PortSwigger's Web Security Academy☆30Jan 6, 2023Updated 3 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆24Jun 14, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- n8n workflows related to bug bounty☆47Oct 27, 2025Updated 4 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆216Apr 5, 2025Updated 11 months ago
- Notes, Writeups, and Cheatsheet for eJPT☆29Jun 9, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- advance web crawler to crawl urls from website using python.☆10Apr 24, 2023Updated 2 years ago
- ☆13Dec 15, 2025Updated 3 months ago
- HTB recon tool to simplify part of the enumeration process☆13May 14, 2025Updated 10 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- The eJPT is a practical penetration testing certification provided by elearnsecurity. Here you will find course notes and the cheat sheet…☆22Nov 3, 2025Updated 4 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- ☆16Nov 13, 2024Updated last year
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆69Feb 5, 2026Updated last month
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 5 months ago
- OmTraffic is a fast and efficient Python Omegle traffic bot that enables you to send a large number of messages to random strangers on Om…☆10May 21, 2023Updated 2 years ago
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆43Jul 16, 2024Updated last year
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆67Feb 22, 2026Updated last month
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago
- Scripts written in BASH, PowerShell, Python, and other languages.☆10Aug 5, 2023Updated 2 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- Boilerplate configuration for trojan server (trojan-gfw).☆12Oct 13, 2019Updated 6 years ago
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- ☆15May 28, 2022Updated 3 years ago
- Solutions for COMP9021 Principles of Programming from UNSW.☆14Nov 20, 2023Updated 2 years ago
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆98Mar 17, 2026Updated last week
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 8 months ago