mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-10-01 01:05:56 -04:00
Update table of content
This commit is contained in:
parent
7c03d180d6
commit
083c6e1fc7
22
README.md
22
README.md
@ -4,12 +4,12 @@
|
||||
A collection of awesome penetration testing resources, tools, confs, books, magazines and other shiny things.
|
||||
|
||||
|
||||
- [Awesome Penetration Testing](#awesome-pentest)
|
||||
- [Awesome Penetration Testing](#awesome-penetration-testing)
|
||||
- [Online Resources](#online-resources)
|
||||
- [Penetration Testing Resources](#online-resources-pentest)
|
||||
- [Social Engineering Resources](#online-resources-se)
|
||||
- [Penetration Testing Resources](#penetration-testing-resources)
|
||||
- [Social Engineering Resources](#social-engineering-resources)
|
||||
- [Tools](#tools)
|
||||
- [Penetration Testing Tools](#tools-pentest)
|
||||
- [Penetration Testing Tools](#penetration-testing-tools)
|
||||
- [Vulnerability Scanners](#tools-scanners)
|
||||
- [Networks Tools](#tools-net)
|
||||
- [Hex Editors](#tools-hex)
|
||||
@ -20,7 +20,7 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
|
||||
- [Reverse Engineering Tools](#tools-re)
|
||||
- [Books](#books)
|
||||
- [Penetration Testing Books](#books-pentest)
|
||||
- [Hacker's Handbook Series](#books-hackers)
|
||||
- [Hackers Handbook Series](#books-hackers)
|
||||
- [Network Analysis Books](#books-net)
|
||||
- [Reverse Engineering Books](#books-re)
|
||||
- [Malware Analysis Books](#books-malware)
|
||||
@ -89,12 +89,12 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
|
||||
* [The Hacker Playbook by Peter Kim, 2014](http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/)
|
||||
* [Violent Python by TJ O'Connor, 2012](http://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)
|
||||
|
||||
#### Hacker's Handbook Series
|
||||
* [The Shellcoder's Handbook by Chris Anley and others, 2007](http://wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
|
||||
* [The Web Application Hacker's Handbook by D. Stuttard, M. Pinto, 2011](http://wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)
|
||||
* [iOS Hacker's Handbook by Charlie Miller and others, 2012](http://wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)
|
||||
* [Android Hacker's Handbook by Joshua J. Drake and others, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)
|
||||
* [The Browser Hacker's Handbook by Wade Alcorn and others, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html)
|
||||
#### Hackers Handbook Series
|
||||
* [The Shellcoders Handbook by Chris Anley and others, 2007](http://wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
|
||||
* [The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011](http://wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)
|
||||
* [iOS Hackers Handbook by Charlie Miller and others, 2012](http://wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)
|
||||
* [Android Hackers Handbook by Joshua J. Drake and others, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)
|
||||
* [The Browser Hackers Handbook by Wade Alcorn and others, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html)
|
||||
|
||||
#### Network Analysis Books
|
||||
* [Nmap Network Scanning by Gordon Fyodor Lyon, 2009](http://nmap.org/book/)
|
||||
|
Loading…
Reference in New Issue
Block a user