# Zero to Hero

Hey there! You can now support my work by buying me a coffee! ☕

<https://www.buymeacoffee.com/davinhong38>

### Whoami

Information Security Analyst 🔵 | Ethical Hacker 🤍| Assoc of (ISC)2 - CISSP | CCSP | CEH

### What is this?

Herein lies documentation for my future self and others alike - where I record my learnings and exploits on my journey in Cybersecurity. Documenting writeups for my practices and CTFs as well.

### Content page

This guide will consist of 3 main parts:

1. The Comprehensive Guide&#x20;
   * Cybersecurity concepts
     * [ ] TCM Pentesting Playlist
     * [ ] Buffer Overflow
     * [ ] Pentest Tools Library
     * [ ] Basic Linux
     * [ ] Scripting
   * Links Archive
2. Writeups
   * Past Machines & Practices
   * Capture the Flags (CTFs)&#x20;
3. Programming knowhow (practices & guide)
   * HackerRank writeups&#x20;
   * Bash (Linux) & PowerShell (Windows)
   * Codecademy - JavaScript
   * SQL
   * Some basic C
4. Theory & Good to know
   * Computer infrastructure etc other knowledge
