mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-23 06:09:22 -05:00
🚀 update
This commit is contained in:
parent
09feab2430
commit
239ef4188a
19
README.md
19
README.md
@ -14,7 +14,7 @@ Uma coleção de recursos de teste de penetração impressionante, ferramentas e
|
|||||||
- [Scanners de vulnerabilidade](#vulnerability-scanners)
|
- [Scanners de vulnerabilidade](#vulnerability-scanners)
|
||||||
- [Ferramentas de redes](#network-tools)
|
- [Ferramentas de redes](#network-tools)
|
||||||
- [Ferramentas de redes wireless](#wireless-network-tools)
|
- [Ferramentas de redes wireless](#wireless-network-tools)
|
||||||
- [Ferramentas de analise SSL](#ssl-analysis-tools)
|
- [Ferramentas de analise de SSL](#ssl-analysis-tools)
|
||||||
- [Editores Hex](#hex-editors)
|
- [Editores Hex](#hex-editors)
|
||||||
- [Crackers](#crackers)
|
- [Crackers](#crackers)
|
||||||
- [Windows Utils](#windows-utils)
|
- [Windows Utils](#windows-utils)
|
||||||
@ -23,18 +23,15 @@ Uma coleção de recursos de teste de penetração impressionante, ferramentas e
|
|||||||
- [Ferramentas de OSInt](#osint-tools)
|
- [Ferramentas de OSInt](#osint-tools)
|
||||||
- [Ferramentas de anonimato](#anonimity-tools)
|
- [Ferramentas de anonimato](#anonimity-tools)
|
||||||
- [Ferramentas de engenharia reversa](#reverse-engineering-tools)
|
- [Ferramentas de engenharia reversa](#reverse-engineering-tools)
|
||||||
<<<<<<< HEAD
|
|
||||||
- [Livros](#books)
|
- [Livros](#books)
|
||||||
- [Penetration Testing Books](#penetration-testing-books)
|
- [Livros de teste de penetração](#penetration-testing-books)
|
||||||
- [Hackers Handbook Series](#hackers-handbook-series)
|
- [Hackers Handbook Series](#hackers-handbook-series)
|
||||||
- [Network Analysis Books](#network-analysis-books)
|
- [Livros de analalise de redes](#network-analysis-books)
|
||||||
- [Reverse Engineering Books](#reverse-engineering-books)
|
- [Livros de engenharia reversa](#reverse-engineering-books)
|
||||||
- [Malware Analysis Books](#malware-analysis-books)
|
- [Livros de analise de malware](#malware-analysis-books)
|
||||||
- [Windows Books](#windows-books)
|
- [Livros de Windows](#windows-books)
|
||||||
- [Social Engineering Books](#social-engineering-books)
|
- [Livros de engenharia social](#social-engineering-books)
|
||||||
- [Lock Picking Books](#lock-picking-books)
|
- [Livros de Lock Picking](#lock-picking-books)
|
||||||
=======
|
|
||||||
>>>>>>> 2227e2269ced24a5a902fc839cad25a1535441ee
|
|
||||||
- [Vulnerability Databases](#vulnerability-databases)
|
- [Vulnerability Databases](#vulnerability-databases)
|
||||||
- [Security Courses](#security-courses)
|
- [Security Courses](#security-courses)
|
||||||
- [Information Security Conferences](#information-security-conferences)
|
- [Information Security Conferences](#information-security-conferences)
|
||||||
|
Loading…
Reference in New Issue
Block a user