Sumit-2706/THM-CyberSec-Sumit2706

GitHub: Sumit-2706/THM-CyberSec-Sumit2706

一份结构化的免费 TryHackMe 网络安全学习路线图,帮助从零到进阶的系统化能力成长。

Stars: 0 | Forks: 0

# THM-CyberSec-Sumit2706
# 🛡️ TryHackMe 网络安全路线图 — 从零到英雄 🚀 ### By Sumit Kumar Singh (Sumit-2706) ![Hacking](https://img.shields.io/badge/Ethical%20Hacking-Roadmap-red?style=for-the-badge&logo=hackthebox) ![TryHackMe](https://img.shields.io/badge/TryHackMe-500%2B%20Free%20Rooms-darkgreen?style=for-the-badge&logo=tryhackme) ![License](https://img.shields.io/badge/License-MIT-blue?style=for-the-badge) ![Stars](https://img.shields.io/github/stars/Sumit-2706/THM-CyberSec-Sumit2706?style=for-the-badge) ![Forks](https://img.shields.io/github/forks/Sumit-2706/THM-CyberSec-Sumit2706?style=for-the-badge) ![Last Commit](https://img.shields.io/github/last-commit/Sumit-2706/THM-CyberSec-Sumit2706?style=for-the-badge)
## 👾 欢迎,未来的黑客! 这是我的 **个人网络安全学习路线图** — 一套从 **基础到高级** 组织的 **500+ 个免费 TryHackMe 房间**,涵盖道德黑客和网络安全的每一个主要领域。 无论你是 **完全的新手** 还是希望 **深入进攻安全**,这条路线图都会一步步引导你 — 没有捷径,只有纯粹的技能积累!💪 ## 🧑‍💻 关于我 — Sumit Kumar Singh - 🎯 致力于从 **零到精英黑客** 的网络安全爱好者 - 🛡️ 通过 **TryHackMe、CTF 和真实实验室** 学习道德黑客 - 💻 专注于 **渗透测试、网络漏洞利用与取证** - 📍 位于 **印度** | 每天都在提升技能 - 🔗 GitHub: [Sumit-2706](https://github.com/Sumit-2706) ## 🗺️ 我的学习哲学 ``` BASIC → NETWORKING → LINUX → WEB HACKING → TOOLS → CRYPTOGRAPHY → FORENSICS → PRIVILEGE ESCALATION → MALWARE ANALYSIS → REVERSE ENGINEERING → ACTIVE DIRECTORY → CTF CHALLENGES → ADVANCED EXPLOITATION → ELITE HACKER 🏆 ``` ## 📊 GitHub 统计 | 🌟 Stars | 🍴 Forks | 🐛 Issues | 📏 Repo Size | 🔔 Open PRs | 🔕 Closed PRs | |---------|---------|----------|-------------|------------|--------------| | ![Stars](https://img.shields.io/github/stars/Sumit-2706/THM-CyberSec-Sumit2706) | ![Forks](https://img.shields.io/github/forks/Sumit-2706/THM-CyberSec-Sumit2706) | ![Issues](https://img.shields.io/github/issues/Sumit-2706/THM-CyberSec-Sumit2706) | ![Size](https://img.shields.io/github/repo-size/Sumit-2706/THM-CyberSec-Sumit2706) | ![Open PRs](https://img.shields.io/github/issues-pr/Sumit-2706/THM-CyberSec-Sumit2706) | ![Closed PRs](https://img.shields.io/github/issues-pr-closed/Sumit-2706/THM-CyberSec-Sumit2706) | ## 📜 目录 | 🔐 类别 | 🔢 总房间数 | ✅ 我已完成 | |------------|--------------|-----------------| | 🧑‍💻 入门房间 | 21 | 9 | | 🐧 Linux 基础 | 4 | 3 | | 🪟 Windows 基础 | 3 | 2 | | 🏗️ 基础房间 | 14 | 1 | | 🔍 侦察 | 10 | 2 | | 📝 脚本编程 | 7 | 0 | | 🌐 网络 | 7 | 5 | | 🛠️ 工具 | 18 | 3 | | 🐳 容器安全 | 3 | 0 | | 🔑 密码学与哈希 | 7 | 2 | | 🖼️ 隐写术 | 6 | 0 | | 🌍 Web 破解 | 33 | 5 | | 📱 Android | 1 | 0 | | 🔬 取证 | 17 | 0 | | 📡 WiFi 破解 | 1 | 1 | | ⚙️ 逆向工程 | 9 | 0 | | 🦠 恶意软件分析 | 8 | 0 | | 📈 权限提升 | 13 | 1 | | 🪟 Windows | 9 | 1 | | 🏢 活动目录 | 8 | 0 | | 📦 PCAP 分析 | 4 | 0 | | 💥 缓冲区溢出 | 4 | 0 | | 🚩 简单 CTF | 98 | 11 | | 🚩 中等 CTF | 99 | 4 | | 🚩 困难 CTF | 42 | 0 | | 💀 极难 CTF | 1 | 1 | | 🎲 其他杂项 | 43 | 0 | | 🎉 特别活动 | 12 | 1 | | **🏆 总计** | **= 502** | **= 50** | ## 🧑‍💻 入门房间 — 从这里开始! - 🕵️ [TryHackMe | 欢迎](https://tryhackme.com/room/hello) - 🕵️ [TryHackMe | 如何使用 TryHackMe](https://tryhackme.com/room/howtousetryhackme) - 🕵️ [TryHackMe | 教程](https://tryhackme.com/room/tutorial) - 🕵️ [TryHackMe | OpenVPN](https://tryhackme.com/room/openvpn) - 🕵️ [TryHackMe | 学习网络安全](https://tryhackme.com/room/beginnerpathintro) - 🕵️ [TryHackMe | 入门网络安全](https://tryhackme.com/room/startingoutincybersec) - 🕵️ [TryHackMe | 初步调研](https://tryhackme.com/room/introtoresearch) - 🕵️ [TryHackMe | 正则表达式](https://tryhackme.com/room/catregex) - 🕵️ [TryHackMe | 网络安全职业](https://tryhackme.com/room/careersincyber) - 🕵️ [TryHackMe | 初级安全分析师入门](https://tryhackme.com/room/jrsecanalystintrouxo) - 🕵️ [TryHackMe | 安全工程师入门](https://tryhackme.com/room/securityengineerintro) - 🕵️ [TryHackMe | Docker 入门](https://tryhackme.com/room/introtodockerk8pdqk) - 🕵️ [TryHackMe | SDLC](https://tryhackme.com/room/sdlc) - 🕵️ [TryHackMe | 日志入门](https://tryhackme.com/room/introtologs) - 🕵️ [TryHackMe | 威胁模拟入门](https://tryhackme.com/room/introductiontothreatemulation) - 🕵️ [TryHackMe | 威胁狩猎:入门](https://tryhackme.com/room/introductiontothreathunting) - 🕵️ [TryHackMe | 威胁狩猎:立足点](https://tryhackme.com/room/threathuntingfoothold) - 🕵️ [TryHackMe | 准备](https://tryhackme.com/room/preparation) - 🕵️ [TryHackMe | 托管虚拟机](https://tryhackme.com/room/hostedhypervisors) - 🕵️ [TryHackMe | 枚举与暴力破解](https://tryhackme.com/room/enumerationbruteforce) - 🕵️ [TryHackMe | 密码学入门](https://tryhackme.com/room/introductiontocryptops) ## 🐧 Linux 基础 — 必须掌握! - 🕵️ [TryHackMe | Linux 模块](https://tryhackme.com/room/linuxmodules) - 🕵️ [TryHackMe | Linux 基础 第1部分](https://tryhackme.com/room/linuxfundamentalspart1) - 🕵️ [TryHackMe | Linux 基础 第2部分](https://tryhackme.com/room/linuxfundamentalspart2) 🚨 *可能不再免费* - 🕵️ [TryHackMe | Linux 基础 第3部分](https://tryhackme.com/room/linuxfundamentalspart3) 🚨 *可能免费* ## 🪟 Windows 基础 - 🕵️ [TryHackMe | Windows 基础 1](https://tryhackme.com/room/windowsfundamentals1xbx) - 🕵️ [TryHackMe | Windows 基础 2](https://tryhackme.com/room/windowsfundamentals2x0x) - 🕵️ [TryHackMe | Windows 基础 3](https://tryhackme.com/room/windowsfundamentals3xzx) ## 🏗️ 基础房间 - 🕵️ [TryHackMe | 基础渗透测试](https://tryhackme.com/room/basicpentestingjt) - 🕵️ [TryHackMe | 渗透测试基础](https://tryhackme.com/room/pentestingfundamentals) - 🕵️ [TryHackMe | 安全原则](https://tryhackme.com/room/principlesofsecurity) - 🕵️ [TryHackMe | 黑客方法论](https://tryhackme.com/room/hackermethodology) - 🕵️ [TryHackMe | 物理安全入门](https://tryhackme.com/room/physicalsecurityintro) - 🕵️ [TryHackMe | Linux 强化训练](https://tryhackme.com/room/linuxstrengthtraining) - 🕵️ [TryHackMe | OpenVAS](https://tryhackme.com/room/openvas) - 🕵️ [TryHackMe | ISO27001](https://tryhackme.com/room/iso27001) - 🕵️ [TryHackMe | UltraTech](https://tryhackme.com/room/ultratech1) - 🕵️ [TryHackMe | Splunk: 探索 SPL](https://tryhackme.com/room/splunkexploringspl) - 🕵️ [TryHackMe | x86 架构概述](https://tryhackme.com/room/x86archintro) - 🕵️ [TryHackMe | 威胁情报用于 SOC](https://tryhackme.com/room/threatintelligenceforsoc) - 🕵️ [TryHackMe | 虚拟机监控程序内部原理](https://tryhackme.com/room/hypervisorinternals) - 🕵️ [TryHackMe | ParrotPost: 钓鱼分析](https://tryhackme.com/room/parrotpost) ## 🔍 侦察 — 了解你的目标 - 🕵️ [TryHackMe | 被动侦察](https://tryhackme.com/room/passiverecon) - 🕵️ [TryHackMe | 主动侦察](https://tryhackme.com/room/activerecon) - 🕵️ [TryHackMe | 内容发现](https://tryhackme.com/room/contentdiscovery) - 🕵️ [TryHackMe | OhSINT](https://tryhackme.com/room/ohsint) - 🕵️ [TryHackMe | Shodan.io](https://tryhackme.com/room/shodan) - 🕵️ [TryHackMe | Google Dorking](https://tryhackme.com/room/googledorking) - 🕵️ [TryHackMe | WebOSINT](https://tryhackme.com/room/webosint) - 🕵️ [TryHackMe | 樱庭房间](https://tryhackme.com/room/sakura) - 🕵️ [TryHackMe | 红队侦察](https://tryhackme.com/room/redteamrecon) - 🕵️ [TryHackMe | Searchlight - IMINT](https://tryhackme.com/room/searchlightosint) ## 📝 脚本编程 — 自动化一切 - 🕵️ [TryHackMe | Python 基础](https://tryhackme.com/room/pythonbasics) - 🕵️ [TryHackMe | Python 练习场](https://tryhackme.com/room/pythonplayground) - 🕵️ [TryHackMe | 入门 PoC 脚本编程](https://tryhackme.com/room/intropocscripting) - 🕵️ [TryHackMe | Peak Hill](https://tryhackme.com/room/peakhill) - 🕵️ [TryHackMe | JavaScript 基础](https://tryhackme.com/room/javascriptbasics) - 🕵️ [TryHackMe | Bash 脚本编程](https://tryhackme.com/room/bashscripting) - 🕵️ [TryHackMe | 学习 Rust](https://tryhackme.com/room/rust) ## 🌐 网络 — 黑客的骨架 - 🕵️ [TryHackMe | 入门网络](https://tryhackme.com/room/introtonetworking) - 🕵️ [TryHackMe | 什么是网络?](https://tryhackme.com/room/whatisnetworking) - 🕵️ [TryHackMe | 网络](https://tryhackme.com/room/bpnetworking) - 🕵️ [TryHackMe | 入门局域网](https://tryhackme.com/room/introtolan) 🚨 *可能不再免费* - 🕵️ [TryHackMe | HTTP 详解](https://tryhackme.com/room/httpindetail) - 🕵️ [TryHackMe | DNS 详解](https://tryhackme.com/room/dnsindetail) - 🕵️ [TryHackMe | 路由器固件转储](https://tryhackme.com/room/dumpingrouterfirmware) ## 🛠️ 工具 — 黑客的军火库 - 🕵️ [TryHackMe | Metasploit:入门](https://tryhackme.com/room/metasploitintro) - 🕵️ [TryHackMe | Nmap](https://tryhackme.com/room/furthernmap) - 🕵️ [TryHackMe | Nmap 活跃主机发现](https://tryhackme.com/room/nmap01) - 🕵️ [TryHackMe | Burp Suite:基础](https://tryhackme.com/room/burpsuitebasics) - 🕵️ [TryHackMe | Burp Suite:Repeater](https://tryhackme.com/room/burpsuiterepeater) - 🕵️ [TryHackMe | Hydra](https://tryhackme.com/room/hydra) - 🕵️ [TryHackMe | RustScan](https://tryhackme.com/room/rustscan) - 🕵️ [TryHackMe | Nessus](https://tryhackme.com/room/rpnessusredux) - 🕵️ [TryHackMe | TShark](https://tryhackme.com/room/tshark) - 🕵️ [TryHackMe | ffuf](https://tryhackme.com/room/ffuf) - 🕵️ [TryHackMe | tmux](https://tryhackme.com/room/rptmux) - 🕵️ [TryHackMe | REmux The Tmux](https://tryhackme.com/room/remuxthesilentworker) - 🕵️ [TryHackMe | 工具箱:Vim](https://tryhackme.com/room/toolboxvim) - 🕵️ [TryHackMe | OWASP ZAP 入门](https://tryhackme.com/room/learnowaspzap) - 🕵️ [TryHackMe | 钓鱼:HiddenEye](https://tryhackme.com/room/phishinghiddeneye) - 🕵️ [TryHackMe | Snyk 开源](https://tryhackme.com/room/snykopensource) - 🕵️ [TryHackMe | Snyk 代码](https://tryhackme.com/room/snykcode) - 🕵️ [TryHackMe | 入门 IaC](https://tryhackme.com/room/introtoiac) ## 🐳 容器安全 - 🕵️ [TryHackMe | K8s 运行时安全](https://tryhackme.com/room/k8sruntimesecurity) - 🕵️ [TryHackMe | K8s 最佳安全实践](https://tryhackme.com/room/k8sbestsecuritypractices) - 🕵️ [TryHackMe | 集群加固](https://tryhackme.com/room/clusterhardening) ## 🔑 密码学与哈希 - 🕵️ [TryHackMe | 密码学入门](https://tryhackme.com/room/cryptographyintro) - 🕵️ [TryHackMe | 密码学入门指南](https://tryhackme.com/room/cryptographyfordummies) - 🕵️ [TryHackMe | 破解 RSA](https://tryhackme.com/room/breakrsa) - 🕵️ [TryHackMe | 破解哈希](https://tryhackme.com/room/crackthehash) - 🕵️ [TryHackMe | 破解哈希 第2级](https://tryhackme.com/room/crackthehashlevel2) - 🕵️ [TryHackMe | Agent Sudo](https://tryhackme.com/room/agentsudoctf) - 🕵️ [TryHackMe | 暴力破解](https://tryhackme.com/room/bruteit) ## 🖼️ 隐写术 — 隐藏在明处 - 🕵️ [TryHackMe | CC: 隐写术](https://tryhackme.com/room/ccstego) - 🕵️ [TryHackMe | Cicada-3301 Vol:1](https://tryhackme.com/room/cicada3301vol1) - 🕵️ [TryHackMe | 音乐隐写](https://tryhackme.com/room/musicalstego) - 🕵️ [TryHackMe | Madness](https://tryhackme.com/room/madness) - 🕵️ [TryHackMe | Psycho Break](https://tryhackme.com/room/psychobreak) - 🕵️ [TryHackMe | 不稳定的双胞胎](https://tryhackme.com/room/unstabletwin) ## 🌍 Web 破解 — 攻击 Web - 🕵️ [TryHackMe | OWASP Top 10 - 2021]() - 🕵️ [TryHackMe | OWASP Top 10](https://tryhackme.com/room/owasptop10) - 🕵️ [TryHackMe | OWASP Juice Shop](https://tryhackme.com/room/owaspjuiceshop) - 🕵️ [TryHackMe | SQL 注入](https://tryhackme.com/room/sqlilab) - 🕵️ [TryHackMe | 高级 SQL 注入](https://tryhackme.com/room/advancedsqlinjection) - 🕵️ [TryHackMe | NoSQL 注入](https://tryhackme.com/room/nosqlinjectiontutorial) - 🕵️ [TryHackMe | XSS](https://tryhackme.com/room/xssgi) - 🕵️ [TryHackMe | CSRF](https://tryhackme.com/room/csrfV2) - 🕵️ [TryHackMe | SSRF](https://tryhackme.com/room/ssrfqi) - 🕵️ [TryHackMe | SSTI](https://tryhackme.com/room/learnssti) - 🕵️ [TryHackMe | 文件包含、路径遍历](https://tryhackme.com/room/fileinc) - 🕵️ [TryHackMe | HTTP 请求走私](https://tryhackme.com/room/httprequestsmuggling) - 🕵️ [TryHackMe | OWASP 破损访问控制](https://tryhackme.com/room/owaspbrokenaccesscontrol) - 🕵️ [TryHackMe | 漏洞 101](https://tryhackme.com/room/vulnerabilities101) - 🕵️ [TryHackMe | 遍历一个应用](https://tryhackme.com/room/walkinganapplication) - 🕵️ [TryHackMe | Web 应用安全](https://tryhackme.com/room/introwebapplicationsecurity) - 🕵️ [TryHackMe | DVWA](https://tryhackme.com/room/dvwa) - 🕵️ [TryHackMe | VulnNet](https://tryhackme.com/room/vulnnet1) - 🕵️ [TryHackMe | Vulnversity](https://tryhackme.com/room/vulnversity) - 🕵️ [TryHackMe | SQL 注入实验](https://tryhackme.com/room/sqlilab) - 🕵️ [TryHackMe | Ignite](https://tryhackme.com/room/ignite) - 🕵️ [TryHackMe | Overpass](https://tryhackme.com/room/overpass) - 🕵️ [TryHackMe | 年度之兔](https://tryhackme.com/room/yearoftherabbit) - 🕵️ [TryHackMe | Bolt](https://tryhackme.com/room/bolt) - 🕵️ [TryHackMe | 微服务架构](https://tryhackme.com/room/microservicearchitectures) ## 📱 Android 破解 - 🕵️ [TryHackMe | Android 破解 101](https://tryhackme.com/room/androidhacking101) ## 🔬 取证 — 寻找证据 - 🕵️ [TryHackMe | 网络杀伤链](https://tryhackme.com/room/cyberkillchainzmt) - 🕵️ [TryHackMe | 数字取证案例 B4DM755](https://tryhackme.com/room/caseb4dm755) - 🕵️ [TryHackMe | 内存取证](https://tryhackme.com/room/memoryforensics) - 🕵️ [TryHackMe | Volatility](https://tryhackme.com/room/bpvolatility) - 🕵️ [TryHackMe | 磁盘分析与 Autopsy](https://tryhackme.com/room/autopsy2ze0) - 🕵️ [TryHackMe | Linux 服务器取证](https://tryhackme.com/room/linuxserverforensics) - 🕵️ [TryHackMe | 取证](https://tryhackme.com/room/forensics) - 🕵️ [TryHackMe | 取证镜像](https://tryhackme.com/room/forensicimaging) - 🕵️ [TryHackMe | 统一杀伤链](https://tryhackme.com/room/unifiedkillchain) - 🕵️ [TryHackMe | Windows 应用程序取证](https://tryhackme.com/room/windowsapplicationsforensics) - 🕵️ [TryHackMe | Linux 事件面](https://tryhackme.com/room/linuxincidentsurface) - 🕵️ [TryHackMe | IR Playbooks](https://tryhackme.com/room/irplaybooks) - 🕵️ [TryHackMe | 初步冷系统取证](https://tryhackme.com/room/introtocoldsystemforensics) - 🕵️ [TryHackMe | Servidae: ELK 中的日志分析](https://tryhackme.com/room/servidae) - 🕵️ [TryHackMe | 识别与范围界定](https://tryhackme.com/room/identificationandscoping) - 🕵️ [TryHackMe | DFIR 哲学与伦理](https://tryhackme.com/room/irphilosophyandethics) - 🕵️ [TryHackMe | DFIR 中的法律考量](https://tryhackme.com/room/legalconsiderationsdfir) ## 📡 WiFi 破解 - 🕵️ [TryHackMe | WiFi 破解 101](https://tryhackme.com/room/wifihacking101) ## ⚙️ 逆向工程 — 解码二进制文件 - 🕵️ [TryHackMe | Windows x64 汇编](https://tryhackme.com/room/win64assembly) - 🕵️ [TryHackMe | 逆向 ELF](https://tryhackme.com/room/reverselfiles) - 🕵️ [TryHackMe | Windows 逆向入门](https://tryhackme.com/room/windowsreversingintro) - 🕵️ [TryHackMe | JVM 逆向工程](https://tryhackme.com/room/jvmreverseengineering) - 🕵️ [TryHackMe | CC: Radare2](https://tryhackme.com/room/ccradare2) - 🕵️ [TryHackMe | CC: Ghidra](https://tryhackme.com/room/ccghidra) - 🕵️ [TryHackMe | Aster](https://tryhackme.com/room/aster) - 🕵️ [TryHackMe | 经典 Passwd](https://tryhackme.com/room/classicpasswd) - 🕵️ [TryHackMe | REloaded](https://tryhackme.com/room/reloaded) ## 🦠 恶意软件分析 — 与病毒战斗 - 🕵️ [TryHackMe | 恶意软件历史](https://tryhackme.com/room/historyofmalware) - 🕵️ [TryHackMe | MAL: 恶意软件入门](https://tryhackme.com/room/malmalintroductory) - 🕵️ [TryHackMe | 基础恶意软件逆向](https://tryhackme.com/room/basicmalwarere) - 🕵️ [TryHackMe | MAL: 调研](https://tryhackme.com/room/malresearching) - 🕵️ [TryHackMe | 移动恶意软件分析](https://tryhackme.com/room/mobilemalwareanalysis) - 🕵️ [TryHackMe | Carnage](https://tryhackme.com/room/c2carnage) - 🕵️ [TryHackMe | Dunkle Materie](https://tryhackme.com/room/dunklematerie) - 🕵️ [TryHackMe | 检测工程入门](https://tryhackme.com/room/introtodetectionengineering) ## 📈 权限提升 — 目标是 Root - 🕵️ [TryHackMe | Linux 权限提升](https://tryhackme.com/room/linprivesc) - 🕵️ [TryHackMe | Linux PrivEsc](https://tryhackme.com/room/linuxprivesc) - 🕵️ [TryHackMe | Linux PrivEsc Arena](https://tryhackme.com/room/linuxprivescarena) - 🕵️ [TryHackMe | Windows 权限提升](https://tryhackme.com/room/windows10privesc) - 🕵️ [TryHackMe | Windows PrivEsc Arena](https://tryhackme.com/room/windowsprivescarena) - 🕵️ [TryHackMe | Linux Agency](https://tryhackme.com/room/linuxagency) - 🕵️ [TryHackMe | Sudo 安全绕过](https://tryhackme.com/room/sudovulnsbypass) - 🕵️ [TryHackMe | Sudo 缓冲区溢出](https://tryhackme.com/room/sudovulnsbof) - 🕵️ [TryHackMe | Blaster](https://tryhackme.com/room/blaster) - 🕵️ [TryHackMe | Ignite](https://tryhackme.com/room/ignite) - 🕵️ [TryHackMe | Kenobi](https://tryhackme.com/room/kenobi) - 🕵️ [TryHackMe | c4ptur3-th3-fl4g](https://tryhackme.com/room/c4ptur3th3fl4g) - 🕵️ [TryHackMe | Pickle Rick](https://tryhackme.com/room/picklerick) ## 🪟 Windows 破解 - 🕵️ [TryHackMe | 研究 Windows](https://tryhackme.com/room/investigatingwindows) - 🕵️ [TryHackMe | 研究 Windows 2.0](https://tryhackme.com/room/investigatingwindows2) - 🕵️ [TryHackMe | 研究 Windows 3.xhttps://tryhackme.com/room/investigatingwindows3) - 🕵️ [TryHackMe | Blueprint](https://tryhackme.com/room/blueprint) - 🕵️ [TryHackMe | VulnNet: Active](https://tryhackme.com/room/vulnnetactive) - 🕵️ [TryHackMe | Anthem](https://tryhackme.com/room/anthem) - 🕵️ [TryHackMe | Blue](https://tryhackme.com/room/blue) - 🕵️ [TryHackMe | Windows 事件面](https://tryhackme.com/room/windowsincidentsurface) - 🕵️ [TryHackMe | 注册表持久性检测](https://tryhackme.com/room/registrypersistencedetection) ## 🏢 活动目录 — 企业级破解 - 🕵️ [TryHackMe | 活动目录基础](https://tryhackme.com/room/winadbasics) - 🕵️ [TryHackMe | 活动目录加固](https://tryhackme.com/room/activedirectoryhardening) - 🕵️ [TryHackMe | 破坏活动目录](https://tryhackme.com/room/breachingad) - 🕵️ [TryHackMe | Attacktive Directory](https://tryhackme.com/room/attacktivedirectory) - 🕵️ [TryHackMe | 后利用基础](https://tryhackme.com/room/postexploit) - 🕵️ [TryHackMe | USTOUN](https://tryhackme.com/room/ustoun) - 🕵️ [TryHackMe | Enterprise](https://tryhackme.com/room/enterprise) - 🕵️ [TryHackMe | RazorBlack](https://tryhackme.com/room/razorblack) ## 📦 PCAP 分析 — 读懂流量 - 🕵️ [TryHackMe | h4cked](https://tryhackme.com/room/h4cked) - 🕵️ [TryHackMe | Carnage](https://tryhackme.com/room/c2carnage) - 🕵️ [TryHackMe | CCT2019](https://tryhackme.com/room/cct2019) - 🕵️ [TryHackMe | Overpass 2 - Hacked](https://tryhackme.com/room/overpass2hacked) ## 💥 缓冲区溢出 — 破坏程序 - 🕵️ [TryHackMe | 缓冲区溢出准备](https://tryhackme.com/room/bufferoverflowprep) - 🕵️ [TryHackMe | Gatekeeper](https://tryhackme.com/room/gatekeeper) - 🕵️ [TryHackMe | Chronicle](https://tryhackme.com/room/chronicle) - 🕵️ [TryHackMe | 入门 Pwntools](https://tryhackme.com/room/introtopwntools) ## 🚩 简单 CTF — 入门挑战 - 🕵️ [TryHackMe | Pickle Rick](https://tryhackme.com/room/picklerick) - 🕵️ [TryHackMe | RootMe](https://tryhackme.com/room/rrootme) - 🕵️ [TryHackMe | 简单 CTF](https://tryhackme.com/room/easyctf) - 🕵️ [TryHackMe | LazyAdmin](https://tryhackme.com/room/lazyadmin) - 🕵️ [TryHackMe | Kenobi](https://tryhackme.com/room/kenobi) - 🕵️ [TryHackMe | Vulnversity](https://tryhackme.com/room/vulnversity) - 🕵️ [TryHackMe | Bounty Hacker](https://tryhackme.com/room/cowboyhacker) - 🕵️ [TryHackMe | Brooklyn Nine Nine](https://tryhackme.com/room/brooklynninenine) - 🕵️ [TryHackMe | GamingServer](https://tryhackme.com/room/gamingserver) - 🕵️ [TryHackMe | Startup](https://tryhackme.com/room/startup) - 🕵️ [TryHackMe | Mr Robot CTF](https://tryhackme.com/room/mrrobot) *(列在中等但适合练习)* - 🕵️ [TryHackMe | Ice](https://tryhackme.com/room/ice) - 🕵️ [TryHackMe | Blaster](https://tryhackme.com/room/blaster) - 🕵️ [TryHackMe | Easy Peasy](https://tryhackme.com/room/easypeasyctf) - 🕵️ [TryHackMe | Ignite](https://tryhackme.com/room/ignite) - 🕵️ [TryHackMe | Thompson](https://tryhackme.com/room/thompson) - 🕵️ [TryHackMe | Lian_Yu](https://tryhackme.com/room/lianyu) - 🕵️ [TryHackMe | Overpass](https://tryhackme.com/room/overpass) - 🕵️ [TryHackMe | 年度之兔](https://tryhackme.com/room/yearoftherabbit) - 🕵️ [TryHackMe | Chocolate Factory](https://tryhackme.com/room/chocolatefactory) - 🕵️ [TryHackMe | Chill Hack](https://tryhackme.com/room/chillhack) - 🕵️ [TryHackMe | Team](https://tryhackme.com/room/teamcw) - 🕵️ [TryHackMe | Archangel](https://tryhackme.com/room/archangel) - 🕵️ [TryHackMe | Cyborg](https://tryhackme.com/room/cyborgt8) - 🕵️ [TryHackMe | Source](https://tryhackme.com/room/source) - 🕵️ [TryHackMe | Couch](https://tryhackme.com/room/couch) - 🕵️ [TryHackMe | Library](https://tryhackme.com/room/bsidesgtlibrary) - 🕵️ [TryHackMe | Wgel CTF](https://tryhackme.com/room/wgelctf) - 🕵️ [TryHackMe | Cat Pictures](https://tryhackme.com/room/catpictures) - 🕵️ [TryHackMe | GLITCH](https://tryhackme.com/room/glitch) ## 🚩 中等 CTF — 提升难度! - 🕵️ [TryHackMe | Mr Robot CTF](https://tryhackme.com/room/mrrobot) - 🕵️ [TryHackMe | Blog](https://tryhackme.com/room/blog) - 🕵️ [TryHackMe | Wonderland](https://tryhackme.com/room/wonderland) - 🕵️ [TryHackMe | Anonymous](https://tryhackme.com/room/anonymous) - 🕵️ [TryHackMe | dogcat](https://tryhackme.com/room/dogcat) - 🕵️ [TryHackMe | The Marketplace](https://tryhackme.com/room/marketplace) - 🕵️ [TryHackMe | Mindgames](https://tryhackme.com/room/mindgames) - 🕵️ [TryHackMe | GoldenEye](https://tryhackme.com/room/goldeneye) - 🕵️ [TryHackMe | Biohazard](https://tryhackme.com/room/biohazard) - 🕵️ [TryHackMe | Relevant](https://tryhackme.com/room/relevant) - 🕵️ [TryHackMe | Boiler CTF](https://tryhackme.com/room/boilerctf2) - 🕵️ [TryHackMe | Overpass 2 - Hacked](https://tryhackme.com/room/overpass2hacked) - 🕵️ [TryHackMe | Overpass 3 - Hosting](https://tryhackme.com/room/overpass3hosting) - 🕵️ [TryHackMe | Tokyo Ghoul](https://tryhackme.com/room/tokyoghoul666) - 🕵️ [TryHackMe | Watcher](https://tryhackme.com/room/watcher) - 🕵️ [TryHackMe | Inferno](https://tryhackme.com/room/inferno) - 🕵️ [TryHackMe | Bookstore](https://tryhackme.com/room/bookstoreoc) - 🕵️ [TryHackMe | CMesS](https://tryhackme.com/room/cmess) - 🕵️ [TryHackMe | Boogeyman 1](https://tryhackme.com/room/boogeyman1) - 🕵️ [TryHackMe | Umbrella](https://tryhackme.com/room/umbrella) - 🕵️ [TryHackMe | Airplane](https://tryhackme.com/room/airplane) - 🕵️ [TryHackMe | Breakme](https://tryhackme.com/room/breakmenu) - 🕵️ [TryHackMe | The London Bridge](https://tryhackme.com/room/thelondonbridge) - 🕵️ [TryHackMe | Backtrack](https://tryhackme.com/room/backtrack) ## 🚩 困难 CTF — 精英水平 - 🕵️ [TryHackMe | Daily Bugle](https://tryhackme.com/room/dailybugle) - 🕵️ [TryHackMe | Retro](https://tryhackme.com/room/retro) - 🕵️ [TryHackMe | Internal](https://tryhackme.com/room/internal) - 🕵️ [TryHackMe |pan 1](https://tryhackme.com/room/brainpan) - 🕵️ [TryHackMe | Year of the Fox](https://tryhackme.com/room/yotf) - 🕵️ [TryHackMe | Year of the Dog](https://tryhackme.com/room/yearofthedog) - 🕵️ [TryHackMe | Year of the Owl](https://tryhackme.com/room/yearoftheowl) - 🕵️ [TryHackMe | Year of the Pig](https://tryhackme.com/room/yearofthepig) - 🕵️ [TryHackMe | Ra](https://tryhackme.com/room/ra) - 🕵️ [TryHackMe | Squid Game](https://tryhackme.com/room/squidgameroom) - 🕵️ [TryHackMe | Jeff](https://tryhackme.com/room/jeff) - 🕵️ [TryHackMe | Fusion Corp](https://tryhackme.com/room/fusioncorp) - 🕵️ [TryHackMe | Crocc Crew](https://tryhackme.com/room/crocccrew) - 🕵️ [TryHackMe | Uranium CTF](https://tryhackme.com/room/uranium) - 🕵️ [TryHackMe | EnterPrize](https://tryhackme.com/room/enterprize) ## 💀 极难 CTF - 🕵️ [TryHackMe | Frosteau Busy with Vim](https://tryhackme.com/room/frosteaubusywithvim) ## 🎲 其他杂项 - 🕵️ **OSINT** — 像专业人士一样从公开来源收集情报 - 🕵️ **社会工程学** — 永远最薄弱的环节是人 - 🕵️ **云安全** — AWS、Azure、GCP 是新的攻击面 - 🕵️ **漏洞开发** — 从零开始编写自己的漏洞利用程序 - 🕵️ **红队** — 完整的对手模拟和规避技术 - 🕵️ **漏洞赏金** — 合法地通过 HackerOne & Bugcrowd 赚钱 ## 🤝 如何贡献 想帮助扩展这个路线图?方法如下: 1. **Fork** 本仓库 2. **添加** 房间到对应章节的 `README.md` 3. **打开** 一个 Pull Request 4. **坐享** 帮助社区的乐趣!🎉 ### ⚠️ 贡献指南 - 仅添加 **免费** 的 TryHackMe 房间 - 添加 **房间名称 + 链接** - 不要重复现有条目 - 保持编号准确 ## ⚖️ 法律免责声明 ## 📜 许可证 本作品根据 **MIT 许可证** 授权 — 您可以使用、复制和修改此内容,只要您 **保留对 Sumit Kumar Singh (Sumit-2706) 的署名**。详见 [LICENSE](LICENSE) 文件。 ## 💖 支持我的工作 如果这条路线图对你的网络安全之旅有所帮助,请在 GitHub 上给它一个 ⭐ 星 — 这意义重大,也能帮助他人找到这个资源!
**由 Sumit Kumar Singh ❤️ 制作 | [GitHub](https://github.com/Sumit-2706)** *Happy Hacking! 🕵️‍♂️🔐*
标签:DAST, TGT, TryHackMe, Web渗透, 个人成长, 主动目录, 云资产清单, 免费实验平台, 学习路线图, 密码学, 恶意软件分析, 手动系统调用, 技能提升, 攻防演练, 特权提升, 网络基础, 网络安全, 自动化部署, 逆向工程, 防御加固, 隐私保护, 黑客之路