Skip to content

kushanbhagya/Hackers-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

██╗  ██╗ █████╗  ██████╗██╗  ██╗███████╗██████╗ ███████╗    ██╗      █████╗ ██████╗
██║  ██║██╔══██╗██╔════╝██║ ██╔╝██╔════╝██╔══██╗██╔════╝    ██║     ██╔══██╗██╔══██╗
███████║███████║██║     █████╔╝ █████╗  ██████╔╝███████╗    ██║     ███████║██████╔╝
██╔══██║██╔══██║██║     ██╔═██╗ ██╔══╝  ██╔══██╗╚════██║    ██║     ██╔══██║██╔══██╗
██║  ██║██║  ██║╚██████╗██║  ██╗███████╗██║  ██║███████║    ███████╗██║  ██║██████╔╝
╚═╝  ╚═╝╚═╝  ╚═╝ ╚═════╝╚═╝  ╚═╝╚══════╝╚═╝  ╚═╝╚══════╝    ╚══════╝╚═╝  ╚═╝╚═════╝

⚔️ Offensive Security · Ethical Hacking · Real-World Attack Simulations


Last Updated Labs Status License Platform


"To defend a system, you must first understand how to break it."


> whoami

This repository documents my hands-on journey through offensive security, practicing real-world attack techniques, exploitation methods, and system compromise simulations in a controlled lab environment.

Each lab is a battle fought, a skill earned.


> cat objectives.txt

[*] Understand how real-world cyber attacks are executed
[*] Gain hands-on exploitation experience across multiple vectors
[*] Learn attacker methodologies: initial access → escalation → persistence
[*] Build a professional cybersecurity portfolio through practical work
[*] Bridge the gap between theory and real-world security scenarios

> ls skills/

Domain Techniques
🌐 Network Exploitation Port scanning, service enumeration, banner grabbing
💉 Web Application Attacks SQLi, XSS, file upload abuse, directory brute-force
🐚 Reverse Shells & Access Netcat shells, TTY upgrades, web shells
🔺 Privilege Escalation Sudo misconfigs, SUID binaries, cron job abuse
🔍 Enumeration LinPEAS, manual recon, service fingerprinting
🔑 Password Attacks Hash cracking with John the Ripper & Hashcat
👣 Persistence Backdoors, startup manipulation
🎯 Red Team Methodology Full attack chain simulation

> nmap --tools

Kali Linux Nmap Burp Suite Metasploit Netcat Hashcat John Gobuster DVWA


> tree lab-structure/

lab-xx-topic/
│
├── 📄 README.md          ← Objective, Setup, Attack Steps, Results
├── 📁 screenshots/       ← Visual proof of exploitation
└── 📝 notes.md           ← Additional findings & references

Each lab contains:

  • Objective — What we're exploiting and why
  • Setup — Environment configuration
  • Attack Steps — Step-by-step execution
  • Explanation — How and why the attack works
  • Results — Outcome and evidence
  • Key Learnings — Takeaways and defense insights

> cat roadmap.md

🔰 Phase 1 — Initial Access & Exploitation

# Lab Status
01 🐚 Reverse Shell (Netcat) ✅ Completed
02 💉 Web Exploitation – SQL Injection ⏳ Pending
03 🎭 Cross-Site Scripting (XSS) ⏳ Pending
04 📂 Directory Bruteforce (Gobuster) ⏳ Pending

⚔️ Phase 2 — Advanced Access Techniques

# Lab Status
05 📤 File Upload Vulnerabilities ⏳ Pending
06 🌐 Web Shell Injection ⏳ Pending
07 🔧 Reverse Shell Upgrade (TTY Shell) ⏳ Pending
08 🔑 Password Cracking (John / Hashcat) ⏳ Pending

🔥 Phase 3 — Privilege Escalation

# Lab Status
09 🔍 Linux Enumeration (linPEAS) ⏳ Pending
10 ⚙️ Sudo Misconfiguration Exploitation ⏳ Pending
11 🔏 SUID Binary Exploitation ⏳ Pending
12 ⏰ Cron Job Exploitation ⏳ Pending

🚀 Phase 4 — Post-Exploitation & Real Scenarios

# Lab Status
13 🔗 Full Attack Chain (Web → Shell → Root) ⏳ Pending
14 👣 Persistence Techniques ⏳ Pending
15 💥 Metasploit Exploitation ⏳ Pending
16 🎮 Multi-Step Attack Simulation ⏳ Pending

🛡️ Extension — Blue Team Integration (Optional)

[+] Detecting attacks using system logs
[+] Monitoring suspicious network activity
[+] Basic incident response practices

> cat progress.log

Total Labs Planned   : 16
Labs Completed       : 1
Labs In Progress     : 0
Completion           : [█░░░░░░░░░░░░░░░░░░░] 6%

Progress bar updates as labs are completed. Follow to stay notified.


> cat disclaimer.txt

╔══════════════════════════════════════════════════════════╗
║  ⚠️  EDUCATIONAL USE ONLY                                 ║
║                                                           ║
║  All techniques in this repository are performed          ║
║  exclusively in controlled, isolated lab environments.    ║
║                                                           ║
║  Unauthorized use of these techniques against systems     ║
║  without explicit permission is ILLEGAL.                  ║
║                                                           ║
║  The author holds no responsibility for misuse.           ║
╚══════════════════════════════════════════════════════════╝

> whoami --author

Kushan Bhagya

Cybersecurity Enthusiast | Ethical Hacking Learner

GitHub LinkedIn


Building skills. Breaking things. Doing it ethically.


[★ Star this repo if you find it useful]

About

A hands-on ethical hacking lab series focused on real-world offensive security techniques, including exploitation, privilege escalation, and attack simulation. This project documents my journey to becoming a cybersecurity professional through practical labs and detailed analysis.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors