Penetration Testing / Bug Hunting / Security Researcher Pathway

Web Application

Mobile Application / APIs

Desktop Application / System Hacking

Binary Exploitation

Reverse Engineering

IoT

Books/ Resources

Practise

Books

Practise

Books

Practise

Books / Resources

Practise

Books

Practise

Web Application Hacker's Handbook

Real World Bug Hunting

Youtube

WriteUps

Hacker101

THM

HTB

PortSwigger Academy

Pico CTF

Web Security Dojo

TryHackMe

HackTheBox

Pico CTF

Hacker 101

Gray Hat Hacking: The Ethical Hacker's Handbook

Hacking The art of Exploitation

Support material for Art Of Exploitation

OWASP top 10

OWASP Juice shop

OWASP Mullitade

Fake Bank

DVWA

Youtube: Pink Draconian

Youtube: Live Overflow

Pico CTF

THM

HTB

Hacking The Art of Explitation

Gray Hat Hacking: The Ethical Hacker's Handbook

Support Material: GHHv5

Pico CTF

TryHackMe

HackTheBox

Support Material of Books

Books

Resources

The ShellCoder's Handbook

The Shellcoder's Handbook

RootKits and BootKits

Practical Malware Analysis

Miscellaneous

Books

Practical Forensic Imaging

Red Team Feild Manual

Practical Packet Analysis

Serious Cryptography

The Car Hacker's Handbook

Practical Binary Analysis

Practical Binary Analysis

Gray Hat Python

Hacking The Humans

CyberSecurity Career MasterPlan

AV Bypass Techniques

Black hat Python

Violent Python

Penetration Testing - A hands-on introduction to Hacking

Gray Hat Hacking: The ethical Hacker's Handbook

Udemy

Web Goat