awesome-pentest/.travis.yml

14 lines
359 B
YAML
Raw Normal View History

---
2016-09-22 15:36:35 -04:00
language: ruby
sudo: required
2016-09-22 15:36:35 -04:00
rvm:
- 2.4.1
install:
- sudo apt update --yes
- sudo apt install ca-certificates
2016-09-22 15:36:35 -04:00
- gem install awesome_bot
2016-09-22 15:36:35 -04:00
script:
This commit proposes a massive reorganization of the list categories. In this commit, the primary change is alphabetizing both the table of contents as well as the line items for each category. This is done in order to make it easier for readers to locate their desired information with their naked eyes. The list is long, and as such should at least have a consistent scheme for ordering the items within it. Alphabetization also side-steps the issue of favoritism since the sort order is lexicographical. Additionally, this commit changes several headings to more clearly describe its contents. For example, most of the subheadings under the "Online Resources" category have been renamed to "Online [Topic] Resources", where "[Topic]" was the old heading. Similarly, I split the Docker Container section into two, one for distros and for tools, since the previous section muddled those two distinct categories of containers together. (The main list does not do this, so that was anomalous.) Another major change is the removal of the top-level "Tools" section. This section had clearly become a catch-all and also prevented us from being able to use sub-headings to more intelligently categorize the individual tools without running afoul of the Awesome List guidelines that restrict us to one level of subheading per category. This continues the work that was begun in #290 of moving, e.g., the "Network Tools" section to its own top-level heading. Further, I have removed several tools that are strictly either forensics or malware analysis utilities, such as cuckoo sandbox. I feel that this more accurately aligns this list with its stated purpose: Penetration Testing. While related, listing forensics of malware analysis tools that cannot also be used for vulnerability discovery or exploit development seems like an invitation to suffer from scope creep. Instead of listing those tools directly, I have therefore added "See also" lines with links to more appropriate places (often other Awesome lists) for their topic. Finally, several links were upgraded from their listed HTTP to HTTPS versions, after I confirmed that those Web servers did indeed respond to TLS requests. I also removed `www.defcon.org` from the `awesome_bot`'s white list, since that link works just fine for me as well.
2019-03-28 15:47:23 -04:00
- awesome_bot README.md --allow-redirect --white-list "www.0day.today,mvfjfugdwgc5uwho.onion,creativecommons.org,netsparker.com,www.shodan.io,www.mhprofessional.com,ghostproject.fr,www.zoomeye.org"