Skip to content

Ethical hacking is the authorized practice of using hacking techniques to identify and fix security vulnerabilities in computer systems and networks. Unlike malicious hackers, ethical hackers work with permission to improve security and protect sensitive data from potential threats

Notifications You must be signed in to change notification settings

ReddyvariSai/Ethical-Hacking-Note

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cybersecurity & Ethical Hacking Notes

This repository contains structured notes, tools, and practical documentation for learning Cybersecurity and Ethical Hacking.

📌 Topics Covered

  • Linux & Kali Linux
  • Footprinting & Reconnaissance
  • Network Scanning & Enumeration
  • Web & DNS Footprinting
  • Burp Suite & Metasploit
  • Malware Concepts
  • Web Application Security
  • Wireless & Cloud Security
  • Penetration Testing Basics

🎯 Purpose

  • Learning & revision
  • Practical reference
  • Resume & portfolio showcase
  • Ethical hacking practice

⚠️ Disclaimer

All content is for educational purposes only. Do not use these techniques on systems without permission.

👤 Author

Reddyvari Sai Kumar Reddy
Cybersecurity Analyst | Ethical Hacker

📂 Final Clean Folder Structure (Professional)

Ethical-Hacking-Notes/
│
├── README.md
│
├── 01_Linux/
│   ├── README.md
│   ├── Linux_Commands.md
│   ├── Kali_Linux/
│   │   ├── README.md
│   │   ├── ifconfig.md
│   │   └── LS_Command.md
│
├── 02_Footprinting_and_Reconnaissance/
│   ├── README.md
│   │
│   ├── Passive_Reconnaissance/
│   │   ├── README.md
│   │   ├── Passive_Recon_Techniques.md
│   │   └── Passive_Recon_Kali.md
│   │
│   ├── Active_Reconnaissance/
│   │   ├── README.md
│   │   └── Active_Recon_Techniques.md
│   │
│   ├── Tools/
│   │   ├── Shodan/
│   │   │   ├── README.md
│   │   │   └── shodan.md
│   │   │
│   │   ├── Censys/
│   │   │   └── README.md
│   │   │
│   │   ├── Google_Dorking/
│   │   │   ├── README.md
│   │   │   ├── Google_Hacking_Database.md
│   │   │   ├── index.html
│   │   │   ├── scripts.js
│   │   │   └── styles.css
│   │   │
│   │   ├── TheHarvester/
│   │   │   ├── README.md
│   │   │   ├── domain_search.md
│   │   │   └── TheHarvester_help.md
│   │   │
│   │   ├── Subdomain_Enumeration/
│   │   │   ├── Subfinder/
│   │   │   │   ├── README.md
│   │   │   │   ├── subfinder_update.md
│   │   │   │   └── subfinder_examples.md
│   │   │   │
│   │   │   └── Sublist3r/
│   │   │       ├── README.md
│   │   │       ├── How_to_Use.md
│   │   │       └── Sublist3r_examples.md
│   │   │
│   │   ├── FOCA/
│   │   │   ├── README.md
│   │   │   └── binaries/
│   │   │       └── FOCA_files_here
│   │   │
│   │   ├── OSRFramework/
│   │   │     ├── Whois & DNS Lookup.md
│   │   │     └── README.md
│   │   │
│   │   ├── Whois/
│   │   │   └── README.md
│   │   │
│   │   └── Wappalyzer/
│   │       └── README.md
│    
├── 03_Scanning_Enumeration_and_Sniffing/
│   ├── README.md
│   │
│   ├── Nmap/
│   │   ├── README.md
│   │   ├── Why_Nmap.md
│   │   ├── Nmap_Commands.md
│   │   └── TCP_Headers.md
│   │
│   ├── Wireshark/
│   │   ├── README.md
│   │   └── Wireshark_Scanning.md
│
├── 04_Web_and_System_Security/
│   ├── Web_Footprinting/
│   │   ├── README.md
│   │   ├── DIRB.md
│   │   └── Web_Spiders.md
│   │
│   ├── Email_Footprinting/
│   │   └── README.md
│   │
│   ├── DNS_Footprinting/
│   │   ├── README.md
│   │   └── whatsmydns.md
│
├── 05_Tools_and_Frameworks/
│   ├── Burp_Suite/
│   │   ├── README.md
│   │   ├── Intruder_Payloads/
│   │   ├── Decoder.md
│   │   └── burp_certificate.md
│   │
│   ├── Metasploit/
│   │   └── README.md
│
├── 06_Malware_and_Threats/
│   ├── README.md
│   ├── Malware_Types.md
│   └── Malware_Introduction.md
│
├── 07_Web_Application_Security/
│   ├── README.md
│   ├── SQL_Injection.md
│   └── Session_Hijacking.md
│
├── 08_Wireless_and_Cloud_Security/
│   └── Wireless_Networks.md
│
├── 09_Web_Application_Basics/
│   ├── README.md
│   ├── Introduction.md
│   └── Web_App_Layout.md
│
├── 10_Penetration_Testing/
│   ├── README.md
│   ├── Pen_Testing_Introduction.md
│   └── Red_Team_vs_Blue_Team.md
│
└── Assets/
    └── images.md

About

Ethical hacking is the authorized practice of using hacking techniques to identify and fix security vulnerabilities in computer systems and networks. Unlike malicious hackers, ethical hackers work with permission to improve security and protect sensitive data from potential threats

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published