Skip to content

cybersecplayground/30-Day-Linux-for-Hackers

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

112 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🐧 30-Day Linux for Hackers

30day_linux

Welcome to the 30-Day Linux for Hackers course — a hands-on guide designed to build your Linux skills from zero to pro, with a hacker’s mindset.

📅 Structured into 30 daily lessons
💻 Real commands, tasks, and scripting exercises
🎯 Focused on cybersecurity, CTFs, red teaming, and automation


📌 Who Is This For?

  • Aspiring ethical hackers
  • Bug bounty hunters
  • Penetration testers
  • Anyone transitioning into cybersecurity
  • Developers who want to master Linux internals

🧭 Table of Contents

day Topic
1 Introduction & Why Linux Matters in Hacking
2 Basic File Navigation in Linux
3 Understanding Linux File Permissions
4 Users, Groups, and Privilege Escalation Basics
5 Linux Package Managers & Dependency Abuse
6 Introduction to Bash Scripting
7 Bash Variables, Arguments & Dynamic Scripting
8 Environment Variables & .bashrc Abuse
9 Processes, Services & Enumeration
10 Cron Jobs: Scheduled Tasks & Exploitation
11 SSH: Secure Shell Access & Abuse
12 File Permissions & Privilege Escalation Basics
13 Environment Variables & PATH Hijacking
14 Logs & System Auditing
15 Networking Fundamentals for Hackers
16 Firewalls & Packet Filtering (iptables & ufw)
17 Secure Shell (SSH) & Tunneling Tricks
18 Linux Kernel & Exploit Basics
19 Linux Persistence Techniques
20 Linux Services & Daemon Exploitation
21 Linux Capabilities & Exploitation (Beyond SUID)
22 Advanced Persistence: systemd timers, user services & kernel modules
23 Containers & Docker Exploitation
24 Host-based Monitoring: auditd & osquery
25 Linux Forensics & Incident Response Basics
26 Automating Linux Privilege Escalation Checks
27 Linux Hardening & Auditd , Monitoring , Output Redirection, Logging for Hackers
28 Linux Network Sniffing & Packet Capture for Hackers
29 Linux Memory Analysis & Credential Hunting (ProcFS & Live Processes)

🛠 Skills You’ll Build

  • Linux terminal fluency
  • Bash scripting for automation
  • Network scanning & service enumeration
  • Privilege escalation techniques
  • System internals & attack surface understanding
  • Red teaming utilities and stealth

📂 How to Use This Repo

  • Clone this repo or browse daily folders
  • Complete the task for each day
  • Take notes, experiment, and modify examples
  • Ask questions and share ideas in the community

📣 Follow Us for More

💬 Join our Telegram channel for exclusive tools, payloads, and CVE content:
👉 https://t.me/cybersecplayground

📺 Watch walkthroughs & tutorials on YouTube:
👉 https://youtube.com/@cybersecplayground

🔗 Explore more on GitHub:
👉 https://github.com/cybersecplayground


🔐 Stay curious, stay dangerous.

About

Welcome to the 30-Day Linux for Hackers course — a hands-on guide designed to build your Linux skills from zero to pro, with a hacker’s mindset.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages