Second-brain

Home

❯

Cybersecurity

Cybersecurity

Feb 16, 20261 min read

  1. Data Structures

  2. Networking Basics

  3. CTF

  4. OSINT

  5. Basics & Working of a Web app

  6. Ports and Vulnerabilities

  7. Website Vulnerabilities

  8. Bug Bounty Methodology and steps

  9. Linux

  10. Tools

  11. SOC

  12. Digital Forensics, Incident Response and Threat Hunting

  13. Regex


Graph View

Backlinks

  • index

Created with Quartz v4.5.1 © 2026

  • GitHub
  • Discord Community