Update README.md

This commit is contained in:
Aniket 2024-10-08 22:56:27 +05:30 committed by GitHub
parent beedabd105
commit 079c340d2a
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -554,7 +554,7 @@ See also *[Intercepting Web proxies](#intercepting-web-proxies)*.
* [Python Programming by @vinta](https://github.com/vinta/awesome-python) - General Python programming.
* [Python tools for penetration testers](https://github.com/dloss/python-pentest-tools) - Lots of pentesting tools are written in Python.
* [Python 101](https://www.darkrelay.com/challenge-page/python-101-course?programId=cf43f996-17e1-4e45-9c3b-d246c1096f86) Python 101
* [Python 102](https://www.darkrelay.com/challenge-page/python-201-course?programId=2f3cff47-3e87-4bfc-8a4d-01b1ca4eb0f9) Python 102
* [Python 102](https://www.darkrelay.com/challenge-page/python-201-course?programId=2f3cff47-3e87-4bfc-8a4d-01b1ca4eb0f9) Python
* [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([Source](https://gitlab.com/rawsec/rawsec-cybersecurity-list))
* [Red Teaming](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) - List of Awesome Red Teaming Resources.
* [Ruby Programming by @Sdogruyol](https://github.com/Sdogruyol/awesome-ruby) - The de-facto language for writing exploits.
@ -569,7 +569,7 @@ See also *[Intercepting Web proxies](#intercepting-web-proxies)*.
* [YARA](https://github.com/InQuest/awesome-yara) - YARA rules, tools, and people.
* [wireshark](https://www.darkrelay.com/challenge-page/what-is-wireshark?programId=220861ad-a2ed-4a10-a7c0-9faf217694d7) End to end wireshark resource, covers complex, real-life scenarios.
* [Introduction to SOC and SIEM](https://www.darkrelay.com/challenge-page/introduction-to-soc-siem?programId=7858e686-c813-4f70-9907-fd96daa71800) The Introduction to SOC and SIEM teaches students about the fundamentals of Security Operations Centers (SOCs) and Security Information and Event Management (SIEM) systems.
*
* [Practical Malware Analysis & Triage](https://academy.tcm-sec.com/p/practical-malware-analysis-triage) Featuring two malware analysis lab build options: local virtual machines and a rapid-deployable cloud malware analysis network! Learn how to spin up a malware analysis network on AWS from anywhere in the world!
### Penetration Testing Report Templates
* [Public Pentesting Reports](https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.
@ -708,7 +708,9 @@ See also *[Web-accessible source code ripping tools](#web-accessible-source-code
## Reverse Engineering
See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing), [*Exploit Development Tools*](#exploit-development-tools).
[Reverse Engineering for everyone](https://0xinfection.github.io/reversing/) by @mytechnotalent
[Reverse engineering with radare2](https://artik.blue/reversing) Some notes on reverse engineering on various architectures, mostly using free software such as the radare2 framework, gdb, frida, x64dbg among others.
[Linux Reverse Engineering CTFs for Beginners](https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/)
### Reverse Engineering Books
* [Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015](http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386)