Learn to Hack
search
⌘Ctrlk
Learn to Hack
  • Introduction
    • 💀whoami
    • Writeups
  • Where to Start?
    • Learn to hack
    • Web Basics
    • HTTP Basics
    • Networking Basics
    • Linux Basics
    • Programming Basics
    • Hacking and its types
    • Phases of hacking
    • Bug Bounty
  • Learn Hacking
    • Platforms to learn hacking
    • Courses for hacking and cybersecurity
    • Youtube Channels CyberSecurity
    • Bug Bounty Writeups
    • Security Books
    • Security Blogs
    • Security News
  • Practice Hacking
    • Practice hacking skills
  • Security Bugs
    • GQL GraphQL
    • Exploit Payment Gateways
    • Unrestricted File Upload
    • XSS Cross Site Scripting
    • CSRF Cross Site Request Forgery
    • SSRF Server Side Request Forgery
    • BAC Broken Access Control
    • BOLA Broken Object Level Authorization
    • SQLi SQL Injection
    • RCE Remote Code Execution
    • IDOR Insecure Direct Object Reference
  • Security Tools
    • Recon
    • Exploitation
    • Setup Burp Collaborator Server
    • Miscellaneous
  • Security Verification Standards
    • ASVS Application Security Verification Standard
    • MASVS Mobile Application Security Verification Standard
  • Security Testing Guides
    • Rest API Security Checklist
    • Web Application Testing Techniques
    • Web Security Testing Guide
    • Mobile Security Testing Guide
  • Security findings
    • Security Articles
  • Special Thanks
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Learn Hacking

Platforms to learn hacking

There are various platforms to learn hacking and security vulnerabilities few of them are free and few of them are paid. The list of platforms are https://www.hacker101.com/arrow-up-right https://www.bugcrowd.com/hackers/bugcrowd-university/arrow-up-right https://portswigger.net/web-securityarrow-up-right https://tryhackme.com/arrow-up-right https://pentesterlab.com/arrow-up-right https://www.vulnhub.com/arrow-up-right https://application.security/arrow-up-right https://www.offensive-security.com/labs/arrow-up-right https://www.hackthebox.eu/arrow-up-right https://owasp.org/projects/arrow-up-right

PreviousBug Bounty Methodologieschevron-leftNextCourses for hacking and cybersecuritychevron-right

Last updated 4 years ago