mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-23 06:09:22 -05:00
Misc sections update
This commit is contained in:
parent
0ad87f4d10
commit
2659593214
13
README.md
13
README.md
@ -28,6 +28,7 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
|||||||
- [Social Engineering Books](#social-engineering-books)
|
- [Social Engineering Books](#social-engineering-books)
|
||||||
- [Information Security Conferences](#information-security-conferences)
|
- [Information Security Conferences](#information-security-conferences)
|
||||||
- [Information Security Magazines](#information-security-magazines)
|
- [Information Security Magazines](#information-security-magazines)
|
||||||
|
- [Awesome Lists](#awesome-lists)
|
||||||
- [Contribution](#contribution)
|
- [Contribution](#contribution)
|
||||||
- [License](#license)
|
- [License](#license)
|
||||||
|
|
||||||
@ -44,6 +45,7 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
|||||||
#### Penetration Testing Tools
|
#### Penetration Testing Tools
|
||||||
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
|
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
|
||||||
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
|
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
|
||||||
|
* [Burp](http://portswigger.net/burp/) - An integrated platform for performing security testing of web applications.
|
||||||
|
|
||||||
#### Vulnerability Scanners
|
#### Vulnerability Scanners
|
||||||
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Vulnerability Management & Risk Management Software.
|
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Vulnerability Management & Risk Management Software.
|
||||||
@ -87,6 +89,9 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
|||||||
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting)
|
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting)
|
||||||
* [Rtfm: Red Team Field Manual by Ben Clark, 2014](http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/)
|
* [Rtfm: Red Team Field Manual by Ben Clark, 2014](http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/)
|
||||||
* [The Hacker Playbook by Peter Kim, 2014](http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/)
|
* [The Hacker Playbook by Peter Kim, 2014](http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/)
|
||||||
|
* [The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013](https://www.elsevier.com/books/the-basics-of-hacking-and-penetration-testing/engebretson/978-1-59749-655-1)
|
||||||
|
* [Professional Penetration Testing by Thomas Wilhelm, 2013](https://www.elsevier.com/books/professional-penetration-testing/wilhelm/978-1-59749-993-4)
|
||||||
|
* [Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012](http://www.packtpub.com/advanced-penetration-testing-for-highly-secured-environments/book)
|
||||||
* [Violent Python by TJ O'Connor, 2012](http://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)
|
* [Violent Python by TJ O'Connor, 2012](http://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)
|
||||||
|
|
||||||
#### Hackers Handbook Series
|
#### Hackers Handbook Series
|
||||||
@ -120,6 +125,10 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
|||||||
* [Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010](http://wiley.com/WileyCDA/WileyTitle/productCd-0470639539.html)
|
* [Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010](http://wiley.com/WileyCDA/WileyTitle/productCd-0470639539.html)
|
||||||
* [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html)
|
* [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html)
|
||||||
|
|
||||||
|
#### Lock Picking
|
||||||
|
* [Practical Lock Picking by Deviant Ollam, 2012](https://www.elsevier.com/books/practical-lock-picking/ollam/978-1-59749-989-7)
|
||||||
|
* [Keys to the Kingdom by Deviant Ollam, 2012](https://www.elsevier.com/books/keys-to-the-kingdom/ollam/978-1-59749-983-5)
|
||||||
|
|
||||||
|
|
||||||
### Information Security Conferences
|
### Information Security Conferences
|
||||||
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas.
|
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas.
|
||||||
@ -147,6 +156,10 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
|||||||
* [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security.
|
* [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security.
|
||||||
|
|
||||||
|
|
||||||
|
### Awesome Lists
|
||||||
|
* [C/C++ Programming](https://github.com/fffaraz/awesome-cpp) - One of the main language for open source security tools.
|
||||||
|
|
||||||
|
|
||||||
### Contribution
|
### Contribution
|
||||||
Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕)
|
Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user