jaeswift-website/api/data/awesomelist/brootware--awesome-cyber-security-university.json

1 line
No EOL
26 KiB
JSON

{"slug": "brootware--awesome-cyber-security-university", "title": "Cyber Security University", "description": "\ud83c\udf93 Because Education should be free. Contributions welcome! \ud83d\udd75\ufe0f", "github_url": "https://github.com/brootware/awesome-cyber-security-university", "stars": "2.6K", "tag": "Security", "entry_count": 150, "subcategory_count": 13, "subcategories": [{"name": "General", "parent": "", "entries": [{"name": "About", "url": "#about", "description": ""}, {"name": "Introduction and Pre-Security", "url": "#introduction-and-pre-security", "description": "(Completed/In Progress)"}, {"name": "Free Beginner Red Team Path", "url": "#free-beginner-red-team-path", "description": "(Add your badge here. The badge code is hidden in this repo)"}, {"name": "Free Beginner Blue Team Path", "url": "#free-beginner-blue-team-path", "description": "(Add your badge here. The badge code is hidden in this repo)"}, {"name": "Bonus CTF practice and Latest CVEs", "url": "#bonus-ctf-practice-and-latest-cves", "description": "(Completed/In Progress)"}, {"name": "Bonus Windows", "url": "#bonus-windows", "description": "(Completed/In Progress)"}, {"name": "Extremely Hard Rooms to do", "url": "#extremely-hard-rooms-to-do", "description": "(Completed/In Progress)"}]}, {"name": "Level 1 - Intro", "parent": "Introduction and Pre-Security", "entries": [{"name": "OpenVPN", "url": "https://tryhackme.com/room/openvpn", "description": "Learn how to connect to a virtual private network using OpenVPN.<!--lint enable double-link-->"}, {"name": "Welcome", "url": "https://tryhackme.com/jr/welcome", "description": "Learn how to use a TryHackMe room to start your upskilling in cyber security."}, {"name": "Intro to Researching", "url": "https://tryhackme.com/room/introtoresearch", "description": "A brief introduction to research skills for pentesting."}, {"name": "Linux Fundamentals 1", "url": "https://tryhackme.com/room/linuxfundamentalspart1", "description": "Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal."}, {"name": "Linux Fundamentals 2", "url": "https://tryhackme.com/room/linuxfundamentalspart2", "description": "Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal."}, {"name": "Linux Fundamentals 3", "url": "https://tryhackme.com/room/linuxfundamentalspart3", "description": "Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal."}, {"name": "Pentesting fundamentals", "url": "https://tryhackme.com/room/pentestingfundamentals", "description": "Fundamentals of penetration testing."}, {"name": "Principles of security", "url": "https://tryhackme.com/room/principlesofsecurity", "description": "Principles of security."}, {"name": "Red Team Engagements", "url": "https://tryhackme.com/room/redteamengagements", "description": "Intro to red team engagements."}, {"name": "Hip Flask", "url": "https://tryhackme.com/room/hipflask", "description": "An in-depth walkthrough covering pentest methodology against a vulnerable server."}, {"name": "Practice Linux Commands", "url": "https://labex.io/courses/linux-basic-commands-practice-online", "description": "A free course with 41 hands-on labs to practice and master the most commonly used Linux commands."}, {"name": "Google Dorking", "url": "https://tryhackme.com/room/googledorking", "description": "Explaining how Search Engines work and leveraging them into finding hidden content!"}, {"name": "Osint", "url": "https://tryhackme.com/room/ohsint", "description": "Intro to Open Source Intelligence."}, {"name": "Shodan.io", "url": "https://tryhackme.com/room/shodan", "description": "Learn about Shodan.io and how to use it for device enumeration."}]}, {"name": "Level 2 - Tooling", "parent": "Free Beginner Red Team Path", "entries": [{"name": "Tmux", "url": "https://tryhackme.com/room/rptmux", "description": "Learn to use tmux, one of the most powerful multi-tasking tools on linux."}, {"name": "Nmap,Curl and Netcat", "url": "https://echoctf.red/challenge/1", "description": "Get experience with Nmap, Curl and Netcat for network communications."}, {"name": "Web Scanning", "url": "https://tryhackme.com/room/rustscan", "description": "Learn the basics of automated web scanning."}, {"name": "Subdomain Enumeration", "url": "https://tryhackme.com/room/subdomainenumeration", "description": "Learn how to find subdomains with different techniques."}, {"name": "Metasploit", "url": "https://tryhackme.com/room/metasploitintro", "description": "An introduction to the main components of the Metasploit Framework."}, {"name": "Hydra", "url": "https://tryhackme.com/room/hydra", "description": "Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website's credentials."}, {"name": "Linux Privesc", "url": "https://tryhackme.com/room/linuxprivesc", "description": "Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available."}, {"name": "Red Team Fundamentals", "url": "https://tryhackme.com/room/redteamfundamentals", "description": "Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements."}, {"name": "Red Team Recon", "url": "https://tryhackme.com/room/redteamrecon", "description": "Learn how to use DNS, advanced searching, Recon-ng, and Maltego to collect information about your target."}, {"name": "Nmap Tutorials", "url": "https://labex.io/tutorials/quick-start-with-nmap-free-tutorials-400132", "description": "Learn and practice the basics of network scanning using Nmap."}, {"name": "Vulnversity", "url": "https://tryhackme.com/room/vulnversity", "description": "Learn about active recon, web app attacks and privilege escalation."}, {"name": "Blue", "url": "https://tryhackme.com/room/blue", "description": "Deploy & hack into a Windows machine, leveraging common misconfigurations issues."}, {"name": "Simple CTF", "url": "https://tryhackme.com/room/easyctf", "description": "Beginner level CTF."}, {"name": "Bounty Hacker", "url": "https://tryhackme.com/room/cowboyhacker", "description": "A space cowboy-themed boot to root machine."}]}, {"name": "Level 3 - Crypto & Hashes with CTF practice", "parent": "Free Beginner Red Team Path", "entries": [{"name": "Crack the hash", "url": "https://tryhackme.com/room/crackthehash", "description": "Cracking hash challenges."}, {"name": "Agent Sudo", "url": "https://tryhackme.com/room/agentsudoctf", "description": "You found a secret server located under the deep sea. Your task is to hack inside the server and reveal the truth."}, {"name": "The Cod Caper", "url": "https://tryhackme.com/room/thecodcaper", "description": "A guided room taking you through infiltrating and exploiting a Linux system."}, {"name": "Ice", "url": "https://tryhackme.com/room/ice", "description": "Deploy & hack into a Windows machine, exploiting a very poorly secured media server."}, {"name": "Lazy Admin", "url": "https://tryhackme.com/room/lazyadmin", "description": "Easy linux machine to practice your skills."}, {"name": "Basic Pentesting", "url": "https://tryhackme.com/room/basicpentestingjt", "description": "This is a machine that allows you to practice web app hacking and privilege escalation."}, {"name": "Bypassing UAC", "url": "https://tryhackme.com/room/bypassinguac", "description": "Learn common ways to bypass User Account Control (UAC) in Windows hosts."}]}, {"name": "Level 4 - Web", "parent": "Free Beginner Red Team Path", "entries": [{"name": "OWASP top 10", "url": "https://tryhackme.com/room/owasptop10", "description": "Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks."}, {"name": "Inclusion", "url": "https://tryhackme.com/room/inclusion", "description": "A beginner-level LFI challenge."}, {"name": "Injection", "url": "https://tryhackme.com/room/injection", "description": "Walkthrough of OS Command Injection. Demonstrate OS Command Injection and explain how to prevent it on your servers."}, {"name": "Juiceshop", "url": "https://tryhackme.com/room/owaspjuiceshop", "description": "This room uses the OWASP juice shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities."}, {"name": "Overpass", "url": "https://tryhackme.com/room/overpass", "description": "What happens when some broke CompSci students make a password manager."}, {"name": "Year of the Rabbit", "url": "https://tryhackme.com/room/yearoftherabbit", "description": "Can you hack into the Year of the Rabbit box without falling down a hole."}, {"name": "DevelPy", "url": "https://tryhackme.com/room/bsidesgtdevelpy", "description": "Boot2root machine for FIT and bsides Guatemala CTF."}, {"name": "Jack of all trades", "url": "https://tryhackme.com/room/jackofalltrades", "description": "Boot-to-root originally designed for Securi-Tay 2020."}, {"name": "Bolt", "url": "https://tryhackme.com/room/bolt", "description": "Bolt themed machine to root into."}]}, {"name": "Level 5 - Reverse Engineering & Pwn", "parent": "Free Beginner Red Team Path", "entries": [{"name": "Windows x64 Assembly", "url": "https://tryhackme.com/r/room/win64assembly", "description": "Introduction to x64 Assembly on Windows."}, {"name": "CC Ghidra", "url": "https://tryhackme.com/room/ccghidra", "description": "This room teaches the basics of ghidra."}, {"name": "CC Radare2", "url": "https://tryhackme.com/room/ccradare2", "description": "This room teaches the basics of radare2."}, {"name": "Reverse Engineering", "url": "https://tryhackme.com/room/reverseengineering", "description": "This room focuses on teaching the basics of assembly through reverse engineering."}, {"name": "Reversing ELF", "url": "https://tryhackme.com/room/reverselfiles", "description": "Room for beginner Reverse Engineering CTF players."}, {"name": "Dumping Router Firmware", "url": "https://tryhackme.com/room/rfirmware", "description": "Reverse engineering router firmware."}, {"name": "Intro to pwntools", "url": "https://tryhackme.com/room/introtopwntools", "description": "Introduction to popular pwn tools framework."}, {"name": "Pwnkit: CVE-2021-4034", "url": "https://tryhackme.com/room/pwnkit", "description": "Interactive lab for exploiting and remediating Pwnkit (CVE-2021-4034) in the Polkit package."}]}, {"name": "Level 6 - PrivEsc", "parent": "Free Beginner Red Team Path", "entries": [{"name": "Sudo Security Bypass", "url": "https://tryhackme.com/room/sudovulnsbypass", "description": "A tutorial room exploring CVE-2019-14287 in the Unix Sudo Program. Room One in the SudoVulns Series."}, {"name": "Sudo Buffer Overflow", "url": "https://tryhackme.com/room/sudovulnsbof", "description": "A tutorial room exploring CVE-2019-18634 in the Unix Sudo Program. Room Two in the SudoVulns Series."}, {"name": "Windows Privesc Arena", "url": "https://tryhackme.com/room/windowsprivescarena", "description": "Students will learn how to escalate privileges using a very vulnerable Windows 7 VM."}, {"name": "Linux Privesc Arena", "url": "https://tryhackme.com/room/linuxprivescarena", "description": "Students will learn how to escalate privileges using a very vulnerable Linux VM."}, {"name": "Windows Privesc", "url": "https://tryhackme.com/room/windows10privesc", "description": "Students will learn how to escalate privileges using a very vulnerable Windows 7 VM."}, {"name": "Blaster", "url": "https://tryhackme.com/room/blaster", "description": "Metasploit Framework to get a foothold."}, {"name": "Ignite", "url": "https://tryhackme.com/room/ignite", "description": "A new start-up has a few security issues with its web server."}, {"name": "Kenobi", "url": "https://tryhackme.com/room/kenobi", "description": "Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation."}, {"name": "Capture the flag", "url": "https://tryhackme.com/room/c4ptur3th3fl4g", "description": "Another beginner-level CTF challenge."}, {"name": "Pickle Rick", "url": "https://tryhackme.com/room/picklerick", "description": "Rick and Morty themed LFI challenge."}]}, {"name": "Level 1 - Tools", "parent": "Free Beginner Blue Team Path", "entries": [{"name": "Introduction to digital forensics", "url": "https://tryhackme.com/room/introdigitalforensics", "description": "Intro to Digital Forensics."}, {"name": "Windows Fundamentals", "url": "https://tryhackme.com/room/windowsfundamentals1xbx", "description": "Intro to Windows."}, {"name": "Nessus", "url": "https://tryhackme.com/room/rpnessusredux", "description": "Intro to nessus scan."}, {"name": "Mitre", "url": "https://tryhackme.com/room/mitre", "description": "Intro to Mitre attack framework."}, {"name": "IntroSIEM", "url": "https://tryhackme.com/room/introtosiem", "description": "Introduction to SIEM."}, {"name": "Yara", "url": "https://tryhackme.com/room/yara", "description": "Intro to yara for malware analysis."}, {"name": "OpenVAS", "url": "https://tryhackme.com/room/openvas", "description": "Intro to openvas."}, {"name": "Intro to Honeypots", "url": "https://tryhackme.com/room/introductiontohoneypots", "description": "Intro to honeypots."}, {"name": "Volatility", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/redline/", "description": "Intro to memory analysis with volatility."}, {"name": "Red Line", "url": "https://tryhackme.com/room/btredlinejoxr3d", "description": "Learn how to use Redline to perform memory analysis and scan for IOCs on an endpoint."}, {"name": "Autopsy", "url": "https://tryhackme.com/room/autopsy2ze0", "description": "Use Autopsy to investigate artifacts from a disk image."}]}, {"name": "Level 2 - Security Operations, Incident Response & Threat Hunting", "parent": "Free Beginner Blue Team Path", "entries": [{"name": "Investigating Windows", "url": "https://tryhackme.com/room/investigatingwindows", "description": "Investigating Windows."}, {"name": "Juicy Details", "url": "https://tryhackme.com/room/juicydetails", "description": "A popular juice shop has been breached! Analyze the logs to see what had happened."}, {"name": "Carnage", "url": "https://tryhackme.com/room/c2carnage", "description": "Apply your analytical skills to analyze the malicious network traffic using Wireshark."}, {"name": "Squid Game", "url": "https://tryhackme.com/room/squidgameroom", "description": "Squid game-themed CTF."}, {"name": "Splunk Boss of the SOC V1", "url": "https://tryhackme.com/room/bpsplunk", "description": "Part of the Blue Primer series, learn how to use Splunk to search through massive amounts of information."}, {"name": "Splunk Boss of the SOC V2", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/16", "description": "Splunk analysis vol 2."}, {"name": "Splunk Boss of the SOC V3", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/8", "description": "Splunk analysis vol 3."}, {"name": "Hunt Conti with Splunk", "url": "https://tryhackme.com/room/contiransomwarehgh", "description": "An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server."}, {"name": "Hunting for Execution Tactic", "url": "https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3", "description": "Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT\\&CK Tactic of Execution (TA0002)."}, {"name": "Hunting for Credential Access", "url": "https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5", "description": "Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT\\&CK Tactic of Credential Access (TA0006)."}, {"name": "Hunting for Persistence Access", "url": "https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2", "description": "Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting workshop covering the topic of adversarial persistence (TA0003)."}, {"name": "Hunting for Defense Evation", "url": "https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4", "description": "Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT\\&CK Tactic of Defense Evasion (TA0005)."}]}, {"name": "Level 3 - Beginner Forensics, Threat Intel & Cryptography", "parent": "Free Beginner Blue Team Path", "entries": [{"name": "Threat Intelligence 101", "url": "https://tryhackme.com/room/cyberthreatintel", "description": "Introduction to Cyber Threat Intelligence."}, {"name": "Threat Intelligence Tools", "url": "https://tryhackme.com/room/threatinteltools", "description": "Explore different OSINT tools used to conduct security threat assessments and investigations."}, {"name": "Martryohka doll", "url": "https://play.picoctf.org/practice/challenge/129?category=4\\&page=1\\&solved=0", "description": "Beginner file analysis challenge."}, {"name": "The Glory of the Garden", "url": "https://play.picoctf.org/practice/challenge/44?category=4\\&page=1\\&solved=0", "description": "Beginner image analysis challenge."}, {"name": "Packets Primer", "url": "https://play.picoctf.org/practice/challenge/286?category=4\\&page=2\\&solved=0", "description": "Beginner packet analysis challenge."}, {"name": "Wireshark doo doo doo", "url": "https://play.picoctf.org/practice/challenge/115?category=4\\&page=1\\&solved=0", "description": "Beginner packet analysis challenge."}, {"name": "Wireshark two two two", "url": "https://play.picoctf.org/practice/challenge/110?category=4\\&page=1\\&solved=0", "description": "Beginner packet analysis challenge."}, {"name": "Trivial flag transfer protocol", "url": "https://play.picoctf.org/practice/challenge/103?category=4\\&page=1\\&solved=0", "description": "Beginner packet analysis challenge."}, {"name": "What Lies within", "url": "https://play.picoctf.org/practice/challenge/74?category=4\\&page=2\\&solved=0", "description": "Beginner decoding analysis challenge."}, {"name": "Illumination", "url": "https://app.hackthebox.com/challenges/illumination", "description": "Medium level forensics challenge."}, {"name": "Emo", "url": "https://app.hackthebox.com/challenges/emo", "description": "Medium level forensics challenge."}, {"name": "Obsecure", "url": "https://app.hackthebox.com/challenges/obscure", "description": "Medium level forensics challenge."}, {"name": "Intel101 Challenge", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/38", "description": "Medium level Threat Intel challenge."}, {"name": "Introduction to Cryptohack", "url": "https://cryptohack.org/courses/intro/course_details/", "description": "Medium level cryptography challenge."}]}, {"name": "Level 4 - Memory & Disk Forensics", "parent": "Free Beginner Blue Team Path", "entries": [{"name": "Sleuthkit Intro", "url": "https://play.picoctf.org/practice/challenge/301?category=4\\&page=2\\&solved=0", "description": "Medium level disk forensics challenge."}, {"name": "Reminiscent", "url": "https://app.hackthebox.com/challenges/reminiscent", "description": "Medium level disk forensics challenge."}, {"name": "Hunter - Windows Disk Image Forensics", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/32", "description": "Medium level disk forensics challenge."}, {"name": "Spotlight - Mac Disk Image Forensics", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/34", "description": "Medium level disk forensics challenge."}, {"name": "Ulysses - Linux Disk Image Forensics", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/41", "description": "Medium level disk forensics challenge."}, {"name": "Banking Troubles - Windows Memory Image Forensics", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/43", "description": "Medium level memory forensics challenge."}, {"name": "Detect Log4J", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/86", "description": "Medium level disk forensics challenge."}]}, {"name": "Level 5 - Malware and Reverse Engineering", "parent": "Free Beginner Blue Team Path", "entries": [{"name": "History of Malware", "url": "https://tryhackme.com/room/historyofmalware", "description": "Intro to malware history."}, {"name": "Malware Introduction", "url": "https://tryhackme.com/room/malmalintroductory", "description": "Intro to malware."}, {"name": "Basic Malware Reverse Engineering", "url": "https://tryhackme.com/room/basicmalwarere", "description": "Intro to malware RE."}, {"name": "Intro Windows Reversing", "url": "https://tryhackme.com/room/windowsreversingintro", "description": "Intro to Windows RE."}, {"name": "Windows x64 Assembly", "url": "https://tryhackme.com/room/win64assembly", "description": "Introduction to x64 Assembly on Windows."}, {"name": "JVM reverse engineering", "url": "https://tryhackme.com/room/jvmreverseengineering", "description": "Learn Reverse Engineering for Java Virtual Machine bytecode."}, {"name": "Get PDF (Malicious Document)", "url": "https://cyberdefenders.org/blueteam-ctf-challenges/47", "description": "Reversing PDF malware."}, {"name": "Bandit", "url": "https://overthewire.org/wargames/bandit/", "description": "Aimed at absolute beginners and teaches the basics of remote server access."}, {"name": "Natas", "url": "https://overthewire.org/wargames/natas/", "description": "Teaches the basics of serverside web-security."}, {"name": "Post Exploitation Basics", "url": "https://tryhackme.com/room/postexploit", "description": "Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom."}, {"name": "Smag Grotto", "url": "https://tryhackme.com/room/smaggrotto", "description": "An obsecure boot to root machine."}, {"name": "Dogcat", "url": "https://tryhackme.com/room/dogcat", "description": "I made a website where you can look at pictures of dogs and/or cats! Exploit a PHP application via LFI and break out of a docker container."}, {"name": "Buffer Overflow Prep", "url": "https://tryhackme.com/room/bufferoverflowprep", "description": "Practice stack-based buffer overflows."}, {"name": "Break out the cage", "url": "https://tryhackme.com/room/breakoutthecage1", "description": "Help Cage bring back his acting career and investigate the nefarious going on of his agent."}, {"name": "Lian Yu", "url": "https://tryhackme.com/room/lianyu", "description": "A beginner-level security challenge."}, {"name": "Insecure Kubernetes", "url": "https://tryhackme.com/room/insekube", "description": "Exploiting Kubernetes by leveraging a Grafana LFI vulnerability."}, {"name": "The Great Escape (docker)", "url": "https://tryhackme.com/room/thegreatescape", "description": "Escaping docker container."}, {"name": "Solr Exploiting Log4j", "url": "https://tryhackme.com/room/solar", "description": "Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun."}, {"name": "Spring4Shell", "url": "https://tryhackme.com/room/spring4shell", "description": "Interactive lab for exploiting Spring4Shell (CVE-2022-22965) in the Java Spring Framework."}, {"name": "Most Recent threats", "url": "https://tryhackme.com/module/recent-threats", "description": "Learn about the latest industry threats. Get hands-on experience identifying, exploiting, and mitigating critical vulnerabilities."}, {"name": "Attacktive Directory", "url": "https://tryhackme.com/room/attacktivedirectory", "description": "Learn about 99% of Corporate networks that run off of AD."}, {"name": "Retro", "url": "https://tryhackme.com/room/retro", "description": "Breaking out of the retro-themed box."}, {"name": "Blue Print", "url": "https://tryhackme.com/room/blueprint", "description": "Hack into this Windows machine and escalate your privileges to Administrator."}, {"name": "Anthem", "url": "https://tryhackme.com/room/anthem", "description": "Exploit a Windows machine in this beginner-level challenge."}, {"name": "Relevant", "url": "https://tryhackme.com/room/relevant", "description": "Penetration Testing Challenge."}, {"name": "Ra", "url": "https://tryhackme.com/room/ra", "description": "You have found WindCorp's internal network and their Domain Controller. Pwn the network."}, {"name": "CCT2019", "url": "https://tryhackme.com/room/cct2019", "description": "Legacy challenges from the US Navy Cyber Competition Team 2019 Assessment sponsored by US TENTH Fleet."}, {"name": "Theseus", "url": "https://tryhackme.com/room/theseus", "description": "The first installment of the SuitGuy series of very hard challenges."}, {"name": "IronCorp", "url": "https://tryhackme.com/room/ironcorp", "description": "Get access to Iron Corp's system."}, {"name": "Carpe Diem 1", "url": "https://tryhackme.com/room/carpediem1", "description": "Recover your client's encrypted files before the ransomware timer runs out."}, {"name": "Borderlands", "url": "https://tryhackme.com/room/borderlands", "description": "Compromise a perimeter host and pivot through this network."}, {"name": "Jeff", "url": "https://tryhackme.com/room/jeff", "description": "Hack into Jeff's web server."}, {"name": "Year of the Owl", "url": "https://tryhackme.com/room/yearoftheowl", "description": "Owl-themed boot to root machine."}, {"name": "Anonymous Playground", "url": "https://tryhackme.com/room/anonymousplayground", "description": "Want to become part of Anonymous? They have a challenge for you."}, {"name": "EnterPrize", "url": "https://tryhackme.com/room/enterprize", "description": "Enterprise-themed network to hack into."}, {"name": "Racetrack Bank", "url": "https://tryhackme.com/room/racetrackbank", "description": "It's time for another heist."}, {"name": "Python Playground", "url": "https://tryhackme.com/room/pythonplayground", "description": "Use python to pwn this room."}]}, {"name": "Contributors & stargazers \u2728", "parent": "Extremely Hard Rooms to do", "entries": []}], "name": ""}