Track Awesome Cyber Security University Updates Daily
🎓 Because Education should be free. Contributions welcome! 🕵️
🏠 Home · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor · 😺 brootware/awesome-cyber-security-university · ⭐ 1.7K · 🏷️ Security
Oct 21, 2024
Introduction and Pre-Security / Level 1 - Intro
- Practice Linux Commands - A free course with 41 hands-on labs to practice and master the most commonly used Linux commands.
Free Beginner Red Team Path / Level 2 - Tooling
- Nmap Tutorials - Learn and practice the basics of network scanning using Nmap.
Jul 07, 2024
About
- Introduction and Pre-security
- Free Beginner Red Team Path
- Free Beginner Blue Team Path
- Bonus practices
- Latest CVEs
- Extremely Hard rooms The tasks are linear in nature of the difficulty. So it's recommended to do it in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
Mar 19, 2024
Free Beginner Blue Team Path / Level 1 - Tools
- Volatility - Intro to memory analysis with volatility.
Mar 17, 2024
Free Beginner Red Team Path / Level 2 - Tooling
- Web Scanning - Learn the basics of automated web scanning.
- Metasploit - An introduction to the main components of the Metasploit Framework.
Nov 09, 2023
Free Beginner Red Team Path / Level 2 - Tooling
- Nmap,Curl and Netcat - Get experience with Nmap, Curl and Netcat for network communications.
Free Beginner Blue Team Path / Level 3 - Beginner Forensics, Threat Intel & Cryptography
- Intel101 Challenge - Medium level Threat Intel challenge.
May 26, 2023
Free Beginner Red Team Path / Level 3 - Crypto & Hashes with CTF practice
- Bypassing UAC - Learn common ways to bypass User Account Control (UAC) in Windows hosts.
Mar 13, 2023
Free Beginner Blue Team Path / Level 2 - Security Operations, Incident Response & Threat Hunting
- Hunting for Execution Tactic - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).
- Hunting for Credential Access - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).
- Hunting for Persistence Access - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting workshop covering the topic of adversarial persistence (TA0003).
- Hunting for Defense Evation - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Defense Evasion (TA0005).
Dec 11, 2022
Free Beginner Blue Team Path / Level 1 - Tools
- IntroSIEM - Introduction to SIEM.
Free Beginner Blue Team Path / Level 2 - Security Operations, Incident Response & Threat Hunting
- Hunt Conti with Splunk - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
Aug 18, 2022
Extremely Hard Rooms to do / Level 5 - Malware and Reverse Engineering
- Year of the Owl - Owl-themed boot to root machine.
Jul 20, 2022
Introduction and Pre-Security / Level 1 - Intro
- Hip Flask - An in-depth walkthrough covering pentest methodology against a vulnerable server.
Jun 08, 2022
Introduction and Pre-Security / Level 1 - Intro
- OpenVPN - Learn how to connect to a virtual private network using OpenVPN.
- Osint - Intro to Open Source Intelligence.
- Shodan.io - Learn about Shodan.io and how to use it for device enumeration.
Free Beginner Red Team Path / Level 2 - Tooling
- Simple CTF - Beginner level CTF.
- Bounty Hacker - A space cowboy-themed boot to root machine.
Free Beginner Red Team Path / Level 3 - Crypto & Hashes with CTF practice
- Basic Pentesting - This is a machine that allows you to practice web app hacking and privilege escalation.
Free Beginner Red Team Path / Level 4 - Web
- Inclusion - A beginner-level LFI challenge.
- Juiceshop - This room uses the OWASP juice shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities.
- Jack of all trades - Boot-to-root originally designed for Securi-Tay 2020.
- Bolt - Bolt themed machine to root into.
Free Beginner Red Team Path / Level 5 - Reverse Engineering & Pwn
- CC Ghidra - This room teaches the basics of ghidra.
- CC Radare2 - This room teaches the basics of radare2.
Free Beginner Red Team Path / Level 6 - PrivEsc
- Blaster - Metasploit Framework to get a foothold.
- Ignite - A new start-up has a few security issues with its web server.
- Capture the flag - Another beginner-level CTF challenge.
Free Beginner Blue Team Path / Level 1 - Tools
- Windows Fundamentals - Intro to Windows.
- Red Line - Learn how to use Redline to perform memory analysis and scan for IOCs on an endpoint.
Free Beginner Blue Team Path / Level 2 - Security Operations, Incident Response & Threat Hunting
- Investigating Windows - Investigating Windows.
- Squid Game - Squid game-themed CTF.
Free Beginner Blue Team Path / Level 3 - Beginner Forensics, Threat Intel & Cryptography
- The Glory of the Garden - Beginner image analysis challenge.
- Emo - Medium level forensics challenge.
- Obsecure - Medium level forensics challenge.
Free Beginner Blue Team Path / Level 4 - Memory & Disk Forensics
- Reminiscent - Medium level disk forensics challenge.
- Detect Log4J - Medium level disk forensics challenge.
Free Beginner Blue Team Path / Level 5 - Malware and Reverse Engineering
- Get PDF (Malicious Document) - Reversing PDF malware.
Bonus CTF practice and Latest CVEs / Level 5 - Malware and Reverse Engineering
- Smag Grotto - An obsecure boot to root machine.
- Buffer Overflow Prep - Practice stack-based buffer overflows.
- Break out the cage - Help Cage bring back his acting career and investigate the nefarious going on of his agent.
- Lian Yu - A beginner-level security challenge.
Bonus Windows / Level 5 - Malware and Reverse Engineering
- Retro - Breaking out of the retro-themed box.
- Anthem - Exploit a Windows machine in this beginner-level challenge.
Extremely Hard Rooms to do / Level 5 - Malware and Reverse Engineering
- Carpe Diem 1 - Recover your client's encrypted files before the ransomware timer runs out.
- EnterPrize - Enterprise-themed network to hack into.
May 23, 2022
Free Beginner Blue Team Path / Level 1 - Tools
- Introduction to digital forensics - Intro to Digital Forensics.
May 22, 2022
Introduction and Pre-Security / Level 1 - Intro
- Welcome - Learn how to use a TryHackMe room to start your upskilling in cyber security.
- Intro to Researching - A brief introduction to research skills for pentesting.
- Linux Fundamentals 1 - Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal.
- Linux Fundamentals 2 - Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal.
- Linux Fundamentals 3 - Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal.
- Pentesting fundamentals - Fundamentals of penetration testing.
- Principles of security - Principles of security.
- Red Team Engagements - Intro to red team engagements.
- Google Dorking - Explaining how Search Engines work and leveraging them into finding hidden content!
Free Beginner Red Team Path / Level 2 - Tooling
- Tmux - Learn to use tmux, one of the most powerful multi-tasking tools on linux.
- Sublist3r - Learn how to find subdomains with Sublist3r.
- Hydra - Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website's credentials.
- Linux Privesc - Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available.
- Red Team Fundamentals - Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements.
- Red Team Recon - Learn how to use DNS, advanced searching, Recon-ng, and Maltego to collect information about your target.
- Vulnversity - Learn about active recon, web app attacks and privilege escalation.
- Blue - Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
Free Beginner Red Team Path / Level 3 - Crypto & Hashes with CTF practice
- Crack the hash - Cracking hash challenges.
- Agent Sudo - You found a secret server located under the deep sea. Your task is to hack inside the server and reveal the truth.
- The Cod Caper - A guided room taking you through infiltrating and exploiting a Linux system.
- Ice - Deploy & hack into a Windows machine, exploiting a very poorly secured media server.
- Lazy Admin - Easy linux machine to practice your skills.
Free Beginner Red Team Path / Level 4 - Web
- OWASP top 10 - Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.
- Injection - Walkthrough of OS Command Injection. Demonstrate OS Command Injection and explain how to prevent it on your servers.
- Overpass - What happens when some broke CompSci students make a password manager.
- Year of the Rabbit - Can you hack into the Year of the Rabbit box without falling down a hole.
- DevelPy - Boot2root machine for FIT and bsides Guatemala CTF.
Free Beginner Red Team Path / Level 5 - Reverse Engineering & Pwn
- Intro to x86 64 - This room teaches the basics of x86-64 assembly language.
- Reverse Engineering - This room focuses on teaching the basics of assembly through reverse engineering.
- Reversing ELF - Room for beginner Reverse Engineering CTF players.
- Dumping Router Firmware - Reverse engineering router firmware.
- Intro to pwntools - Introduction to popular pwn tools framework.
- Pwnkit: CVE-2021-4034 - Interactive lab for exploiting and remediating Pwnkit (CVE-2021-4034) in the Polkit package.
Free Beginner Red Team Path / Level 6 - PrivEsc
- Sudo Security Bypass - A tutorial room exploring CVE-2019-14287 in the Unix Sudo Program. Room One in the SudoVulns Series.
- Sudo Buffer Overflow - A tutorial room exploring CVE-2019-18634 in the Unix Sudo Program. Room Two in the SudoVulns Series.
- Windows Privesc Arena - Students will learn how to escalate privileges using a very vulnerable Windows 7 VM.
- Linux Privesc Arena - Students will learn how to escalate privileges using a very vulnerable Linux VM.
- Windows Privesc - Students will learn how to escalate privileges using a very vulnerable Windows 7 VM.
- Kenobi - Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.
- Pickle Rick - Rick and Morty themed LFI challenge.
Free Beginner Blue Team Path / Level 1 - Tools
- Nessus - Intro to nessus scan.
- Mitre - Intro to Mitre attack framework.
- Yara - Intro to yara for malware analysis.
- OpenVAS - Intro to openvas.
- Intro to Honeypots - Intro to honeypots.
- Autopsy - Use Autopsy to investigate artifacts from a disk image.
Free Beginner Blue Team Path / Level 2 - Security Operations, Incident Response & Threat Hunting
- Juicy Details - A popular juice shop has been breached! Analyze the logs to see what had happened.
- Carnage - Apply your analytical skills to analyze the malicious network traffic using Wireshark.
- Splunk Boss of the SOC V1 - Part of the Blue Primer series, learn how to use Splunk to search through massive amounts of information.
- Splunk Boss of the SOC V2 - Splunk analysis vol 2.
- Splunk Boss of the SOC V3 - Splunk analysis vol 3.
Free Beginner Blue Team Path / Level 3 - Beginner Forensics, Threat Intel & Cryptography
- Martryohka doll - Beginner file analysis challenge.
- Packets Primer - Beginner packet analysis challenge.
- Wireshark doo doo doo - Beginner packet analysis challenge.
- Wireshark two two two - Beginner packet analysis challenge.
- Trivial flag transfer protocol - Beginner packet analysis challenge.
- What Lies within - Beginner decoding analysis challenge.
- Illumination - Medium level forensics challenge.
- Introduction to Cryptohack - Medium level cryptography challenge.
Free Beginner Blue Team Path / Level 4 - Memory & Disk Forensics
- Sleuthkit Intro - Medium level disk forensics challenge.
- Hunter - Windows Disk Image Forensics - Medium level disk forensics challenge.
- Spotlight - Mac Disk Image Forensics - Medium level disk forensics challenge.
- Ulysses - Linux Disk Image Forensics - Medium level disk forensics challenge.
- Banking Troubles - Windows Memory Image Forensics - Medium level memory forensics challenge.
Free Beginner Blue Team Path / Level 5 - Malware and Reverse Engineering
- History of Malware - Intro to malware history.
- Malware Introduction - Intro to malware.
- Basic Malware Reverse Engineering - Intro to malware RE.
- Intro Windows Reversing - Intro to Windows RE.
- Windows x64 Assembly - Introduction to x64 Assembly on Windows.
- JVM reverse engineering - Learn Reverse Engineering for Java Virtual Machine bytecode.
Bonus CTF practice and Latest CVEs / Level 5 - Malware and Reverse Engineering
- Bandit - Aimed at absolute beginners and teaches the basics of remote server access.
- Natas - Teaches the basics of serverside web-security.
- Post Exploitation Basics - Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom.
- Dogcat - I made a website where you can look at pictures of dogs and/or cats! Exploit a PHP application via LFI and break out of a docker container.
- Insecure Kubernetes - Exploiting Kubernetes by leveraging a Grafana LFI vulnerability.
- The Great Escape (docker) - Escaping docker container.
- Solr Exploiting Log4j - Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.
- Spring4Shell - Interactive lab for exploiting Spring4Shell (CVE-2022-22965) in the Java Spring Framework.
- Most Recent threats - Learn about the latest industry threats. Get hands-on experience identifying, exploiting, and mitigating critical vulnerabilities.
Bonus Windows / Level 5 - Malware and Reverse Engineering
- Attacktive Directory - Learn about 99% of Corporate networks that run off of AD.
- Blue Print - Hack into this Windows machine and escalate your privileges to Administrator.
- Relevant - Penetration Testing Challenge.
Extremely Hard Rooms to do / Level 5 - Malware and Reverse Engineering
- Ra - You have found WindCorp's internal network and their Domain Controller. Pwn the network.
- CCT2019 - Legacy challenges from the US Navy Cyber Competition Team 2019 Assessment sponsored by US TENTH Fleet.
- Theseus - The first installment of the SuitGuy series of very hard challenges.
- IronCorp - Get access to Iron Corp's system.
- Borderlands - Compromise a perimeter host and pivot through this network.
- Jeff - Hack into Jeff's web server.
- Anonymous Playground - Want to become part of Anonymous? They have a challenge for you.
- Racetrack Bank - It's time for another heist.
- Python Playground - Use python to pwn this room.