Skip to content

25bda095-droid/My-Planet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

21 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

⚑ Rishav Cyber Security Vault ⚑

πŸš€ Learn β€’ Practice β€’ Hack β€’ Repeat
A Complete Cyber Security & Bug Bounty Learning Hub


🧠 About This Repository

This repository is a complete collection of Cyber Security resources, including:

  • πŸ“š Books (Beginner β†’ Advanced)
  • 🐞 Bug Bounty Methodology
  • πŸ› οΈ Tools & Recon Techniques
  • πŸ’» Programming for Hackers
  • 🎯 Practice Labs & CTFs

⚑ Everything is structured for real-world hacking & learning


πŸ“Œ Index

  • 🐧 Learn WSL
  • πŸ“š Cyber Security Books
  • πŸ“– Self Help Books
  • 🐞 Bug Bounty Material
  • πŸ› οΈ Tools
  • 🧠 Roadmap
  • πŸ’» Programming Languages
  • 🎯 Practice Platforms
  • πŸ† Certifications

🐧 Learn WSL (Windows Subsystem for Linux)

βš™οΈ Installation

Enable:

Windows Subsystem for Linux

Virtual Machine Platform

Run: wsl --install

Restart system


πŸ› οΈ Useful Commands

wsl --update wsl --version wsl --list wsl --set-default


πŸ–₯️ GUI Setup

sudo apt update && sudo apt upgrade sudo apt install kali-win-kex kex


πŸ“š Cyber Security Books

πŸ“˜ Book 🎯 Focus
Black Hat Python Exploitation
Violent Python Practical
Bug Bounty Bootcamp Bug Hunting
Linux Basics for Hackers Beginner
Web Security for Developers Web
The Hacker Playbook 3 Advanced
Real World Bug Hunting Practical
Attacking Network Protocols Network

πŸ“– Self-Help Books

  • Atomic Habits
  • Do Epic Shit
  • Ikigai
  • Eat That Frog
  • Can't Hurt Me

🐞 Bug Bounty Methodology

⚑ Strategy

  • Chain vulnerabilities πŸ”—
  • Analyze every request via proxy πŸ”
  • Focus on logic flaws 🧠

🎯 Vulnerabilities

πŸ”Έ XSS

  • Test all inputs
  • Use payload variations

πŸ”Έ CSRF

  • Remove/modify token
  • Change request type

πŸ”Έ IDOR

  • Modify IDs
  • Use 2 accounts

πŸ”Έ SSRF

  • Access internal endpoints

πŸ”Έ Open Redirect

  • Abuse redirect parameters

πŸ”Έ Account Takeover

  • Weak reset logic
  • OTP bypass

πŸ”Έ File Upload

  • Change file types
  • Inject payloads

πŸ› οΈ Tools Arsenal

πŸ” Recon

  • Sublist3r
  • Amass
  • MassDNS

🌐 Web

  • Burp Suite
  • FFUF
  • Dirsearch

βš”οΈ Exploitation

  • SQLMap
  • Metasploit
  • Hydra

🧠 Cyber Security Roadmap

Basics β†’ Networking β†’ Linux β†’ Web ↓ Programming β†’ Python / JS ↓ Web Security β†’ OWASP Top 10 ↓ Advanced β†’ Red Team / Exploitation


πŸ’» Programming Languages

🌐 Web

  • HTML
  • CSS
  • JavaScript

βš™οΈ Core

  • C
  • C++
  • Python

🧾 Scripting

  • Bash
  • PowerShell

🎯 Practice Platforms


πŸ† Certifications

  • CompTIA Security+
  • CEH
  • eJPT
  • OSCP

⚑ Contribution

Want to contribute?

  • Add resources πŸ“š
  • Add tools πŸ› οΈ
  • Improve notes ✍️

πŸš€ Goals

  • Become a Bug Bounty Hunter πŸ’°
  • Master Web Security 🌐
  • Build own tools βš™οΈ
  • Crack real-world vulnerabilities πŸ”₯

⚠️ Disclaimer

This repository is for educational purposes only.
Use knowledge responsibly and only on authorized systems.


⭐ Support

If you like this project:

⭐ Star the repo
πŸ” Share with friends


πŸ”₯ Author

Rishav Mishra
Cyber Security Learner ⚑

About

A curated knowledge base bridging Data Science, AI, and Cybersecurity. It features comprehensive notes on Bug Bounty, API, and Cloud Security, alongside my academic focus on DSA. This collection aims to connect intelligent systems with robust security architectures. Note: All resources belong to their respective copyright owners.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors