mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2025-04-24 17:09:15 -04:00
Update README.md
This commit is contained in:
parent
beedabd105
commit
079c340d2a
@ -554,7 +554,7 @@ See also *[Intercepting Web proxies](#intercepting-web-proxies)*.
|
||||
* [Python Programming by @vinta](https://github.com/vinta/awesome-python) - General Python programming.
|
||||
* [Python tools for penetration testers](https://github.com/dloss/python-pentest-tools) - Lots of pentesting tools are written in Python.
|
||||
* [Python 101](https://www.darkrelay.com/challenge-page/python-101-course?programId=cf43f996-17e1-4e45-9c3b-d246c1096f86) Python 101
|
||||
* [Python 102](https://www.darkrelay.com/challenge-page/python-201-course?programId=2f3cff47-3e87-4bfc-8a4d-01b1ca4eb0f9) Python 102
|
||||
* [Python 102](https://www.darkrelay.com/challenge-page/python-201-course?programId=2f3cff47-3e87-4bfc-8a4d-01b1ca4eb0f9) Python
|
||||
* [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([Source](https://gitlab.com/rawsec/rawsec-cybersecurity-list))
|
||||
* [Red Teaming](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) - List of Awesome Red Teaming Resources.
|
||||
* [Ruby Programming by @Sdogruyol](https://github.com/Sdogruyol/awesome-ruby) - The de-facto language for writing exploits.
|
||||
@ -569,7 +569,7 @@ See also *[Intercepting Web proxies](#intercepting-web-proxies)*.
|
||||
* [YARA](https://github.com/InQuest/awesome-yara) - YARA rules, tools, and people.
|
||||
* [wireshark](https://www.darkrelay.com/challenge-page/what-is-wireshark?programId=220861ad-a2ed-4a10-a7c0-9faf217694d7) End to end wireshark resource, covers complex, real-life scenarios.
|
||||
* [Introduction to SOC and SIEM](https://www.darkrelay.com/challenge-page/introduction-to-soc-siem?programId=7858e686-c813-4f70-9907-fd96daa71800) The Introduction to SOC and SIEM teaches students about the fundamentals of Security Operations Centers (SOCs) and Security Information and Event Management (SIEM) systems.
|
||||
*
|
||||
* [Practical Malware Analysis & Triage](https://academy.tcm-sec.com/p/practical-malware-analysis-triage) Featuring two malware analysis lab build options: local virtual machines and a rapid-deployable cloud malware analysis network! Learn how to spin up a malware analysis network on AWS from anywhere in the world!
|
||||
### Penetration Testing Report Templates
|
||||
|
||||
* [Public Pentesting Reports](https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.
|
||||
@ -708,7 +708,9 @@ See also *[Web-accessible source code ripping tools](#web-accessible-source-code
|
||||
## Reverse Engineering
|
||||
|
||||
See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing), [*Exploit Development Tools*](#exploit-development-tools).
|
||||
|
||||
[Reverse Engineering for everyone](https://0xinfection.github.io/reversing/) by @mytechnotalent
|
||||
[Reverse engineering with radare2](https://artik.blue/reversing) Some notes on reverse engineering on various architectures, mostly using free software such as the radare2 framework, gdb, frida, x64dbg among others.
|
||||
[Linux Reverse Engineering CTFs for Beginners](https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/)
|
||||
### Reverse Engineering Books
|
||||
|
||||
* [Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015](http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386)
|
||||
|
Loading…
x
Reference in New Issue
Block a user