Penetration Testing / Bug Hunting / Security Researcher Pathway
Web Application
Mobile Application / APIs
Desktop Application / System Hacking
Binary Exploitation
Reverse Engineering
IoT
Books/ Resources
Practise
Books
Practise
Books
Practise
Books / Resources
Practise
Books
Practise
Web Application Hacker's Handbook
Real World Bug Hunting
Youtube
WriteUps
Hacker101
THM
HTB
PortSwigger Academy
Pico CTF
Web Security Dojo
TryHackMe
HackTheBox
Pico CTF
Hacker 101
Gray Hat Hacking: The Ethical Hacker's Handbook
Hacking The art of Exploitation
Support material for Art Of Exploitation
OWASP top 10
OWASP Juice shop
OWASP Mullitade
Fake Bank
DVWA
Youtube: Pink Draconian
Youtube: Live Overflow
Pico CTF
THM
HTB
Hacking The Art of Explitation
Gray Hat Hacking: The Ethical Hacker's Handbook
Support Material: GHHv5
Pico CTF
TryHackMe
HackTheBox
Support Material of Books
Books
Resources
The ShellCoder's Handbook
The Shellcoder's Handbook
RootKits and BootKits
Practical Malware Analysis
Miscellaneous
Books
Practical Forensic Imaging
Red Team Feild Manual
Practical Packet Analysis
Serious Cryptography
The Car Hacker's Handbook
Practical Binary Analysis
Practical Binary Analysis
Gray Hat Python
Hacking The Humans
CyberSecurity Career MasterPlan
AV Bypass Techniques
Black hat Python
Violent Python
Penetration Testing - A hands-on introduction to Hacking
Gray Hat Hacking: The ethical Hacker's Handbook
Udemy
Web Goat