# Welcome

Welcome to my cybersecurity gitbook! Here, I’ll share in a short format the concepts and insights I’ve gained throughout my journey in cybersecurity.

### Common Plateforms to learn cybersecurity concepts

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>TryHackme</strong></td><td>Learn cybersecurity with insightfull lessons            </td><td><a href="https://3366121826-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fdo9UTLEVhvOrL0zBVbm6%2Fuploads%2FeyjhJFGGM8Mz5zcr03cl%2F1694483032332.png?alt=media&#x26;token=7310e911-2bb0-4082-a9f6-970e73e809e0">1694483032332.png</a></td><td></td><td><a href="https://tryhackme.com/">https://tryhackme.com/</a></td></tr><tr><td><strong>HackTheBox</strong> </td><td>Gain experience in practical labs    </td><td><a href="https://3366121826-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fdo9UTLEVhvOrL0zBVbm6%2Fuploads%2F09qvhkLIJLIfh2ixmyZ0%2F1_1sDyhew8Sm5PdXLgqwppqA.png?alt=media&#x26;token=d524cf17-dd6c-49b6-847d-a1fa25423118">1_1sDyhew8Sm5PdXLgqwppqA.png</a></td><td></td><td><a href="https://www.hackthebox.com/">https://www.hackthebox.com/</a></td></tr><tr><td><strong>CryptoHack</strong></td><td>Plateform to learn cryptology   </td><td><a href="https://3366121826-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fdo9UTLEVhvOrL0zBVbm6%2Fuploads%2FnYLbOC5qu1d5yqTgHS0p%2Fmain.png?alt=media&#x26;token=e47b3359-90d0-4273-8a4a-4a63d336fa6c">main.png</a></td><td></td><td><a href="https://cryptohack.org/">https://cryptohack.org/</a></td></tr></tbody></table>

## Locations where you can find some exploits

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>Exploit-Db</td><td>This platform centralized lot of exploits on known CVE.</td><td></td><td><a href="https://3366121826-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fdo9UTLEVhvOrL0zBVbm6%2Fuploads%2FheXey9fydjsrbtYR4DET%2Fedb-spider-orange.png?alt=media&#x26;token=9782d180-7f4b-4725-9fd8-3011a7ba8854">edb-spider-orange.png</a></td><td><a href="https://www.exploit-db.com/">https://www.exploit-db.com/</a></td></tr><tr><td>Payload for pentests</td><td><ul><li><a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master">PayloadsAllTheThings</a></li><li><a href="http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet">Pentest Monkey</a></li><li><a href="https://www.thehacker.recipes/">Hacker Recipes</a></li><li><a href="https://book.hacktricks.xyz/">Hacktricks</a> <a href="https://www.ired.team/">iReadteam</a></li><li><a href="https://vulp3cula.gitbook.io/hackers-grimoire/">Hacker Grimoire</a></li></ul></td><td></td><td><a href="https://3366121826-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fdo9UTLEVhvOrL0zBVbm6%2Fuploads%2FVfR9ndjuKEaSn78wSLcQ%2Fgithub-logo.webp?alt=media&#x26;token=6224af1a-b23f-4afb-82ff-5e0e33cd5883">github-logo.webp</a></td><td><a href="https://swisskyrepo.github.io/PayloadsAllTheThings/">https://swisskyrepo.github.io/PayloadsAllTheThings/</a></td></tr><tr><td>Abuse unix, windows or drivers misconfigurations.</td><td><ul><li><a href="https://gtfobins.github.io/">GTFOBINS</a></li><li><a href="https://lolbas-project.github.io/">LOLABS</a></li><li><a href="https://www.loldrivers.io/">LOLDRIVERS</a></li></ul></td><td></td><td><a href="https://3366121826-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fdo9UTLEVhvOrL0zBVbm6%2Fuploads%2FhV4FJxs6cYx6F8mMCwCW%2Flogo.png?alt=media&#x26;token=eec9bf00-ffb7-4eaf-919b-fbde954f23c5">logo.png</a></td><td><a href="https://gtfobins.github.io/gtfobins/cat/#sudo">https://gtfobins.github.io/gtfobins/cat/#sudo</a></td></tr></tbody></table>
