Ethical Hacking

Ethical hacking, also known as "penetration testing," is the practice of identifying vulnerabilities and weaknesses in computer systems and networks with the goal of improving their security. This stack is a collection of tools that are useful for ethical hacking.

0% Completed

Python

Python

C++

C++

C#

C#

C

C

Java

Java

Swift

Swift

🚀 Modules to Learn

Generic
Python
Ruby
Go/Golang
C
C++
Perl
PHP
Bash
External

Fundamentals

1

These are general knowledge topics about the internet and software development

How the Internet WorksYOUR PROGRESS - 0%
Software Development ProcessYOUR PROGRESS - 0%
Data Structures & AlgorithmsYOUR PROGRESS - 0%

Scripting

2

These are mainline CLI languages that are used to interact with shells on different operating systems, try to understand as many as possible

BashYOUR PROGRESS - 0%
PowershellYOUR PROGRESS - 0%

Programming Languages

3

Knowledge of some of these languages will be required for ethical hacking tools, try to select the tools you are interested in first and then learn the related language

PythonYOUR PROGRESS - 0%
RubyYOUR PROGRESS - 0%
Go/GolangYOUR PROGRESS - 0%
CYOUR PROGRESS - 0%
C++YOUR PROGRESS - 0%
PerlYOUR PROGRESS - 0%
PHPYOUR PROGRESS - 0%

Content Management Systems

4

These are just some popular CMSs, if you will be hacking a CMS then you have to first learn about that CMS, knowledge of any of these is only required when working with a CMS

Information Gathering

5

Information gathering tools, also known as reconnaissance tools, are software programs designed to collect information about a target system or network. Pick any of them and also remember that it may have a specific language it uses so Pick one for a language you learned

Password Attacks

6

Password attacking tools, also known as password cracking tools, are software programs designed to recover passwords used to access protected systems or data. Also try to get familiar with at least one

Probable Wordlists

Wireless Testing

7

Wireless testing refers to the process of testing the security of wireless networks and devices, such as Wi-Fi routers, access points, and mobile devices. Also get familiar with at least one

Exploitation Tools

8

Exploitation tools are software programs used by hackers and security professionals to take advantage of vulnerabilities in computer systems and applications. Also get familiar with at least one

Sniffing & Spoofing

9

Sniffing and spoofing tools are software programs used by hackers and security professionals to intercept and manipulate network traffic for various purposes, including stealing sensitive information, bypassing security measures, or conducting other malicious activities. Also try to master at least one

Web Hacking

10

Web hacking tools are software programs used by hackers and security professionals to identify vulnerabilities and exploit weaknesses in web applications and websites. These tools are used to conduct various attacks, including injection attacks, cross-site scripting (XSS) attacks, and other malicious activities. Try to master the ones your require for your task

Frameworks

11

Ethical hacking frameworks are comprehensive approaches or methodologies that guide ethical hackers and security professionals in conducting security assessments and penetration testing of systems and networks. These frameworks provide a structured process for identifying vulnerabilities and security weaknesses, and for providing recommendations for mitigating security risks. Try to master at least one

Recent job openings