mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-23 06:09:22 -05:00
Consolidate Books sections, offload tangentially related topics.
This commit is contained in:
parent
1eff0b8c08
commit
11a21c2050
49
README.md
49
README.md
@ -15,12 +15,8 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Tor Tools](#tor-tools)
|
* [Tor Tools](#tor-tools)
|
||||||
* [Anti-virus Evasion Tools](#anti-virus-evasion-tools)
|
* [Anti-virus Evasion Tools](#anti-virus-evasion-tools)
|
||||||
* [Books](#books)
|
* [Books](#books)
|
||||||
* [Defensive Programming Books](#defensive-programming-books)
|
|
||||||
* [Hacker's Handbook Series Books](#hackers-handbook-series-books)
|
|
||||||
* [Malware Analysis Books](#malware-analysis-books)
|
* [Malware Analysis Books](#malware-analysis-books)
|
||||||
* [Network Analysis Books](#network-analysis-books)
|
|
||||||
* [Penetration Testing Books](#penetration-testing-books)
|
* [Penetration Testing Books](#penetration-testing-books)
|
||||||
* [Windows Books](#windows-books)
|
|
||||||
* [CTF Tools](#ctf-tools)
|
* [CTF Tools](#ctf-tools)
|
||||||
* [Collaboration Tools](#collaboration-tools)
|
* [Collaboration Tools](#collaboration-tools)
|
||||||
* [Conferences and Events](#conferences-and-events)
|
* [Conferences and Events](#conferences-and-events)
|
||||||
@ -126,57 +122,33 @@ See also [awesome-tor](https://github.com/ajvb/awesome-tor).
|
|||||||
|
|
||||||
See also [DEF CON Suggested Reading](https://www.defcon.org/html/links/book-list.html).
|
See also [DEF CON Suggested Reading](https://www.defcon.org/html/links/book-list.html).
|
||||||
|
|
||||||
### Defensive Programming Books
|
|
||||||
|
|
||||||
* [Holistic Info-Sec for Web Developers (Fascicle 0)](https://leanpub.com/holistic-infosec-for-web-developers)
|
|
||||||
* [Holistic Info-Sec for Web Developers (Fascicle 1)](https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications)
|
|
||||||
|
|
||||||
### Hacker's Handbook Series Books
|
|
||||||
|
|
||||||
* [Android Hacker's Handbook by Joshua J. Drake et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)
|
|
||||||
* [Car Hacker's Handbook by Craig Smith, 2016](https://nostarch.com/carhacking)
|
|
||||||
* [The Database Hacker's Handbook, David Litchfield et al., 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)
|
|
||||||
* [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)
|
|
||||||
* [The Mobile Application Hacker's Handbook by Dominic Chell et al., 2015](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html)
|
|
||||||
* [iOS Hacker's Handbook by Charlie Miller et al., 2012](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)
|
|
||||||
|
|
||||||
### Malware Analysis Books
|
|
||||||
|
|
||||||
* [Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470613033.html)
|
|
||||||
* [Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012](https://nostarch.com/malware)
|
|
||||||
* [The Art of Memory Forensics by Michael Hale Ligh et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118825098.html)
|
|
||||||
|
|
||||||
### Network Analysis Books
|
|
||||||
|
|
||||||
* [Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012](http://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace-ebook/dp/B008CG8CYU/)
|
|
||||||
* [Nmap Network Scanning by Gordon Fyodor Lyon, 2009](https://nmap.org/book/)
|
|
||||||
* [Practical Packet Analysis by Chris Sanders, 2011](https://nostarch.com/packet2.htm)
|
|
||||||
* [Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012](https://www.amazon.com/Wireshark-Network-Analysis-Second-Certified/dp/1893939944)
|
|
||||||
|
|
||||||
### Penetration Testing Books
|
|
||||||
|
|
||||||
* [Advanced Penetration Testing by Wil Allsopp, 2017](https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/)
|
* [Advanced Penetration Testing by Wil Allsopp, 2017](https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/)
|
||||||
* [Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012](http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu)
|
* [Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012](http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu)
|
||||||
* [Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014](http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362)
|
* [Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014](http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362)
|
||||||
|
* [Android Hacker's Handbook by Joshua J. Drake et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)
|
||||||
|
* [BTFM: Blue Team Field Manual by Alan J White & Ben Clark, 2017](https://www.amazon.de/Blue-Team-Field-Manual-BTFM/dp/154101636X)
|
||||||
* [Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014](http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)
|
* [Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014](http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)
|
||||||
* [Btfm: Blue Team Field Manual by Alan J White & Ben Clark, 2017](https://www.amazon.de/Blue-Team-Field-Manual-BTFM/dp/154101636X)
|
|
||||||
* [Bug Hunter's Diary by Tobias Klein, 2011](https://nostarch.com/bughunter)
|
* [Bug Hunter's Diary by Tobias Klein, 2011](https://nostarch.com/bughunter)
|
||||||
|
* [Car Hacker's Handbook by Craig Smith, 2016](https://nostarch.com/carhacking)
|
||||||
* [Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007](http://www.fuzzing.org/)
|
* [Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007](http://www.fuzzing.org/)
|
||||||
* [Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011](https://nostarch.com/metasploit)
|
* [Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011](https://nostarch.com/metasploit)
|
||||||
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](https://nostarch.com/pentesting)
|
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](https://nostarch.com/pentesting)
|
||||||
* [Penetration Testing: Procedures & Methodologies by EC-Council, 2010](http://www.amazon.com/Penetration-Testing-Procedures-Methodologies-EC-Council/dp/1435483677)
|
* [Penetration Testing: Procedures & Methodologies by EC-Council, 2010](http://www.amazon.com/Penetration-Testing-Procedures-Methodologies-EC-Council/dp/1435483677)
|
||||||
* [Professional Penetration Testing by Thomas Wilhelm, 2013](https://www.elsevier.com/books/professional-penetration-testing/wilhelm/978-1-59749-993-4)
|
* [Professional Penetration Testing by Thomas Wilhelm, 2013](https://www.elsevier.com/books/professional-penetration-testing/wilhelm/978-1-59749-993-4)
|
||||||
* [Rtfm: Red Team Field Manual by Ben Clark, 2014](http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/)
|
* [RTFM: Red Team Field Manual by Ben Clark, 2014](http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/)
|
||||||
* [The Art of Exploitation by Jon Erickson, 2008](https://nostarch.com/hacking2.htm)
|
* [The Art of Exploitation by Jon Erickson, 2008](https://nostarch.com/hacking2.htm)
|
||||||
* [The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013](https://www.elsevier.com/books/the-basics-of-hacking-and-penetration-testing/engebretson/978-1-59749-655-1)
|
* [The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013](https://www.elsevier.com/books/the-basics-of-hacking-and-penetration-testing/engebretson/978-1-59749-655-1)
|
||||||
|
* [The Database Hacker's Handbook, David Litchfield et al., 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)
|
||||||
* [The Hacker Playbook by Peter Kim, 2014](http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/)
|
* [The Hacker Playbook by Peter Kim, 2014](http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/)
|
||||||
|
* [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)
|
||||||
|
* [The Mobile Application Hacker's Handbook by Dominic Chell et al., 2015](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html)
|
||||||
* [Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010](http://www.amazon.com/Unauthorised-Access-Physical-Penetration-Security-ebook/dp/B005DIAPKE)
|
* [Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010](http://www.amazon.com/Unauthorised-Access-Physical-Penetration-Security-ebook/dp/B005DIAPKE)
|
||||||
* [Violent Python by TJ O'Connor, 2012](https://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)
|
* [Violent Python by TJ O'Connor, 2012](https://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)
|
||||||
|
* [iOS Hacker's Handbook by Charlie Miller et al., 2012](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)
|
||||||
|
|
||||||
### Windows Books
|
### Malware Analysis Books
|
||||||
|
|
||||||
* [Troubleshooting with the Windows Sysinternals Tools by Mark Russinovich & Aaron Margosis, 2016](https://www.amazon.com/Troubleshooting-Windows-Sysinternals-Tools-2nd/dp/0735684448/)
|
See [awesome-malware-analysis § Books](https://github.com/rshipp/awesome-malware-analysis#books).
|
||||||
* [Windows Internals by Mark Russinovich et al., 2012](http://www.amazon.com/Windows-Internals-Part-Developer-Reference/dp/0735648735/)
|
|
||||||
|
|
||||||
## CTF Tools
|
## CTF Tools
|
||||||
|
|
||||||
@ -530,7 +502,6 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools).
|
|||||||
* [Security-related Operating Systems](https://list.rawsec.ml/operating_systems.html) - List of security related operating systems.
|
* [Security-related Operating Systems](https://list.rawsec.ml/operating_systems.html) - List of security related operating systems.
|
||||||
* [JavaScript Programming](https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting.
|
* [JavaScript Programming](https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting.
|
||||||
* [Kali Linux Tools](http://tools.kali.org/tools-listing) - List of tools present in Kali Linux.
|
* [Kali Linux Tools](http://tools.kali.org/tools-listing) - List of tools present in Kali Linux.
|
||||||
* [Malware Analysis](https://github.com/rshipp/awesome-malware-analysis) - Tools and resources for analysts.
|
|
||||||
* [Node.js Programming by @sindresorhus](https://github.com/sindresorhus/awesome-nodejs) - Curated list of delightful Node.js packages and resources.
|
* [Node.js Programming by @sindresorhus](https://github.com/sindresorhus/awesome-nodejs) - Curated list of delightful Node.js packages and resources.
|
||||||
* [Pentest Cheat Sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Awesome Pentest Cheat Sheets.
|
* [Pentest Cheat Sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Awesome Pentest Cheat Sheets.
|
||||||
* [Python Programming by @svaksha](https://github.com/svaksha/pythonidae) - General Python programming.
|
* [Python Programming by @svaksha](https://github.com/svaksha/pythonidae) - General Python programming.
|
||||||
|
Loading…
Reference in New Issue
Block a user