mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2025-01-11 06:59:30 -05:00
🚀 update readme
This commit is contained in:
parent
faafab233b
commit
2227e2269c
23
README.md
23
README.md
@ -1,6 +1,6 @@
|
|||||||
## Awesome Penetration Testing
|
## Awesome Penetration Testing
|
||||||
|
|
||||||
Uma coleção de recursos impressionantes de teste de penetração, ferramentas e outras coisas brilhantes
|
Uma coleção de recursos de teste de penetração impressionante, ferramentas e outras coisas brilhantes
|
||||||
|
|
||||||
|
|
||||||
- [Recursos online](#online-resources)
|
- [Recursos online](#online-resources)
|
||||||
@ -15,23 +15,14 @@ Uma coleção de recursos impressionantes de teste de penetração, ferramentas
|
|||||||
- [Ferramentas de redes](#network-tools)
|
- [Ferramentas de redes](#network-tools)
|
||||||
- [Ferramentas de redes wireless](#wireless-network-tools)
|
- [Ferramentas de redes wireless](#wireless-network-tools)
|
||||||
- [Ferramentas de analise SSL](#ssl-analysis-tools)
|
- [Ferramentas de analise SSL](#ssl-analysis-tools)
|
||||||
- [Hex Editors](#hex-editors)
|
- [Editores Hex](#hex-editors)
|
||||||
- [Crackers](#crackers)
|
- [Crackers](#crackers)
|
||||||
- [Windows Utils](#windows-utils)
|
- [Windows Utils](#windows-utils)
|
||||||
- [DDoS Tools](#ddos-tools)
|
- [Ferramentas de DDoS](#ddos-tools)
|
||||||
- [Social Engineering Tools](#social-engineering-tools)
|
- [Ferramentas de engenharia social](#social-engineering-tools)
|
||||||
- [OSInt Tools](#osint-tools)
|
- [Ferramentas de OSInt](#osint-tools)
|
||||||
- [Anonimity Tools](#anonimity-tools)
|
- [Ferramentas de anonimato](#anonimity-tools)
|
||||||
- [Reverse Engineering Tools](#reverse-engineering-tools)
|
- [Ferramentas de engenharia reversa](#reverse-engineering-tools)
|
||||||
- [Livros](#books)
|
|
||||||
- [Penetration Testing Books](#penetration-testing-books)
|
|
||||||
- [Hackers Handbook Series](#hackers-handbook-series)
|
|
||||||
- [Network Analysis Books](#network-analysis-books)
|
|
||||||
- [Reverse Engineering Books](#reverse-engineering-books)
|
|
||||||
- [Malware Analysis Books](#malware-analysis-books)
|
|
||||||
- [Windows Books](#windows-books)
|
|
||||||
- [Social Engineering Books](#social-engineering-books)
|
|
||||||
- [Lock Picking Books](#lock-picking-books)
|
|
||||||
- [Vulnerability Databases](#vulnerability-databases)
|
- [Vulnerability Databases](#vulnerability-databases)
|
||||||
- [Security Courses](#security-courses)
|
- [Security Courses](#security-courses)
|
||||||
- [Information Security Conferences](#information-security-conferences)
|
- [Information Security Conferences](#information-security-conferences)
|
||||||
|
Loading…
Reference in New Issue
Block a user