From 43f8367e52083515265666ec4fdac104635f0be4 Mon Sep 17 00:00:00 2001 From: fabacab Date: Mon, 6 Jul 2020 18:25:10 -0400 Subject: [PATCH] Fix more minor issues, also replace lock picking refs with other list. This commit removes the various areas of the list containing information about Lock Picking and replaces them with a single top-level section that refers interested readers to the dedicated Awesome Lockpicking list because that list contains all the information we had, and more. --- README.md | 26 ++++++++------------------ 1 file changed, 8 insertions(+), 18 deletions(-) diff --git a/README.md b/README.md index efe3699..89bc539 100644 --- a/README.md +++ b/README.md @@ -17,7 +17,6 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea * [Books](#books) * [Defensive Programming Books](#defensive-programming-books) * [Hacker's Handbook Series Books](#hackers-handbook-series-books) - * [Lock Picking Books](#lock-picking-books) * [Malware Analysis Books](#malware-analysis-books) * [Network Analysis Books](#network-analysis-books) * [Penetration Testing Books](#penetration-testing-books) @@ -42,6 +41,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea * [Hash Cracking Tools](#hash-cracking-tools) * [Hex Editors](#hex-editors) * [Industrial Control and SCADA Systems](#industrial-control-and-scada-systems) +* [Lock Picking](#lock-picking) * [macOS Utilities](#macos-utilities) * [Multi-paradigm Frameworks](#multi-paradigm-frameworks) * [Network Tools](#network-tools) @@ -140,13 +140,6 @@ See also [DEF CON Suggested Reading](https://www.defcon.org/html/links/book-list * [The Web Application Hacker's Handbook by D. Stuttard, M. Pinto, 2011](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html) * [iOS Hacker's Handbook by Charlie Miller et al., 2012](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html) -### Lock Picking Books - -* [Eddie the Wire books](https://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0) -* [Keys to the Kingdom by Deviant Ollam, 2012](https://www.elsevier.com/books/keys-to-the-kingdom/ollam/978-1-59749-983-5) -* [Lock Picking: Detail Overkill by Solomon](https://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0) -* [Practical Lock Picking by Deviant Ollam, 2012](https://www.elsevier.com/books/practical-lock-picking/ollam/978-1-59749-989-7) - ### Malware Analysis Books * [Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470613033.html) @@ -366,6 +359,10 @@ See also [awesome-industrial-control-system-security](https://github.com/hslatma * [Industrial Exploitation Framework (ISF)](https://github.com/dark-lbp/isf) - Metasploit-like exploit framework based on routersploit designed to target Industrial Control Systems (ICS), SCADA devices, PLC firmware, and more. * [s7scan](https://github.com/klsecservices/s7scan) - Scanner for enumerating Siemens S7 PLCs on a TCP/IP or LLC network. +## Lock Picking + +See [awesome-lockpicking](https://github.com/fabacab/awesome-lockpicking). + ## macOS Utilities * [Bella](https://github.com/kdaoudieh/Bella) - Pure Python post-exploitation data mining and remote administration tool for macOS. @@ -492,12 +489,13 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools). * [KRACK Detector](https://github.com/securingsam/krackdetector) - Detect and prevent KRACK attacks in your network. * [Kismet](https://kismetwireless.net/) - Wireless network detector, sniffer, and IDS. * [PSKracker](https://github.com/soxrok2212/PSKracker) - Collection of WPA/WPA2/WPS default algorithms, password generators, and PIN generators written in C. -* [pwnagotchi](https://github.com/evilsocket/pwnagotchi) - Deep reinforcement learning based AI that learns from the Wi-Fi environment and instruments BetterCAP in order to maximize the WPA key material captured. * [Reaver](https://code.google.com/archive/p/reaver-wps) - Brute force attack against WiFi Protected Setup. +* [WiFi Pineapple](https://www.wifipineapple.com/) - Wireless auditing and penetration testing platform. * [WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) - Framework for rogue Wi-Fi access point attack. * [Wifite](https://github.com/derv82/wifite) - Automated wireless attack tool. * [infernal-twin](https://github.com/entropy1337/infernal-twin) - Automated wireless hacking tool. * [krackattacks-scripts](https://github.com/vanhoefm/krackattacks-scripts) - WPA2 Krack attack scripts. +* [pwnagotchi](https://github.com/evilsocket/pwnagotchi) - Deep reinforcement learning based AI that learns from the Wi-Fi environment and instruments BetterCAP in order to maximize the WPA key material captured. * [wifi-arsenal](https://github.com/0x90/wifi-arsenal) - Resources for Wi-Fi Pentesting. ## Network Vulnerability Scanners @@ -594,12 +592,6 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools). * [Shellcode Examples](http://shell-storm.org/shellcode/) - Shellcodes database. * [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode. -### Online Lock Picking Resources - -* [/r/lockpicking](https://www.reddit.com/r/lockpicking) - Resources for learning lockpicking, equipment recommendations. -* [Schuyler Towne channel](https://www.youtube.com/user/SchuylerTowne/) - Lockpicking videos and security talks. -* [bosnianbill](https://www.youtube.com/user/bosnianbill) - Instructional lockpicking videos made by an expert. - ### Online Open Sources Intelligence (OSINT) Resources * [CertGraph](https://github.com/lanrat/certgraph) - Crawls a domain's SSL/TLS certificates for its certificate alternative names. @@ -635,7 +627,6 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools). * [Android Security](https://github.com/ashishb/android-security-awesome) - Collection of Android security related resources. * [AppSec](https://github.com/paragonie/awesome-appsec) - Resources for learning about application security. * [Awesome Awesomness](https://github.com/bayandin/awesome-awesomeness) - The List of the Lists. -* [Awesome Lockpicking](https://github.com/meitar/awesome-lockpicking) - Awesome guides, tools, and other resources about the security and compromise of locks, safes, and keys. * [Awesome Shodan Queries](https://github.com/jakejarvis/awesome-shodan-queries) - Awesome list of useful, funny, and depressing search queries for Shodan. * [AWS Tool Arsenal](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) - List of tools for testing and securing AWS environments. * [Blue Team](https://github.com/fabacab/awesome-cybersecurity-blueteam) - Awesome resources, tools, and other shiny things for cybersecurity blue teams. @@ -704,11 +695,10 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools). * [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more. * [Thunderclap](https://thunderclap.io/) - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports. * [USB Rubber Ducky](http://usbrubberducky.com/) - Customizable keystroke injection attack platform masquerading as a USB thumbdrive. -* [WiFi Pineapple](https://www.wifipineapple.com/) - Wireless auditing and penetration testing platform. ## Reverse Engineering Tools -See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing). +See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing), [*Exploit Development Tools*](#exploit-development-tools). * [Capstone](http://www.capstone-engine.org/) - Lightweight multi-platform, multi-architecture disassembly framework. * [Evan's Debugger](http://www.codef00.com/projects#debugger) - OllyDbg-like debugger for GNU/Linux.