diff --git a/README.md b/README.md index 41be829..fc503c2 100644 --- a/README.md +++ b/README.md @@ -10,65 +10,62 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea ## Contents -- [Awesome Penetration Testing ![Awesome](https://github.com/sindresorhus/awesome)](#awesome-penetration-testing-awesomehttpsgithubcomsindresorhusawesome) - - [Contents](#contents) - - [Online Resources](#online-resources) - - [Penetration Testing Resources](#penetration-testing-resources) - - [Exploit Development](#exploit-development) - - [Open Sources Intelligence (OSINT) Resources](#open-sources-intelligence-osint-resources) - - [Social Engineering Resources](#social-engineering-resources) - - [Lock Picking Resources](#lock-picking-resources) - - [Operating Systems](#operating-systems) - - [Tools](#tools) - - [Penetration Testing Distributions](#penetration-testing-distributions) - - [Docker for Penetration Testing](#docker-for-penetration-testing) - - [Multi-paradigm Frameworks](#multi-paradigm-frameworks) - - [Network vulnerability scanners](#network-vulnerability-scanners) - - [Static Analyzers](#static-analyzers) - - [Web Vulnerability Scanners](#web-vulnerability-scanners) - - [Network Tools](#network-tools) - - [Exfiltration Tools](#exfiltration-tools) - - [Network Reconnaissance Tools](#network-reconnaissance-tools) - - [Protocol Analyzers and Sniffers](#protocol-analyzers-and-sniffers) - - [Proxies and MITM Tools](#proxies-and-mitm-tools) - - [Wireless Network Tools](#wireless-network-tools) - - [Transport Layer Security Tools](#transport-layer-security-tools) - - [Web Exploitation](#web-exploitation) - - [Hex Editors](#hex-editors) - - [File Format Analysis Tools](#file-format-analysis-tools) - - [Anti-virus Evasion Tools](#anti-virus-evasion-tools) - - [Hash Cracking Tools](#hash-cracking-tools) - - [Windows Utilities](#windows-utilities) - - [GNU/Linux Utilities](#gnulinux-utilities) - - [macOS Utilities](#macos-utilities) - - [DDoS Tools](#ddos-tools) - - [Social Engineering Tools](#social-engineering-tools) - - [OSINT Tools](#osint-tools) - - [Anonymity Tools](#anonymity-tools) - - [Reverse Engineering Tools](#reverse-engineering-tools) - - [Physical Access Tools](#physical-access-tools) - - [Industrial Control and SCADA Systems](#industrial-control-and-scada-systems) - - [Side-channel Tools](#side-channel-tools) - - [CTF Tools](#ctf-tools) - - [Penetration Testing Report Templates](#penetration-testing-report-templates) - - [Code examples for Penetration Testing](#code-examples-for-penetration-testing) - - [Books](#books) - - [Penetration Testing Books](#penetration-testing-books) - - [Hackers Handbook Series](#hackers-handbook-series) - - [Defensive Development](#defensive-development) - - [Network Analysis Books](#network-analysis-books) - - [Reverse Engineering Books](#reverse-engineering-books) - - [Malware Analysis Books](#malware-analysis-books) - - [Windows Books](#windows-books) - - [Social Engineering Books](#social-engineering-books) - - [Lock Picking Books](#lock-picking-books) - - [Defcon Suggested Reading](#defcon-suggested-reading) - - [Vulnerability Databases](#vulnerability-databases) - - [Security Courses](#security-courses) - - [Information Security Conferences](#information-security-conferences) - - [Information Security Magazines](#information-security-magazines) - - [Awesome Lists](#awesome-lists) -- [License](#license) +* [Online Resources](#online-resources) + * [Penetration Testing Resources](#penetration-testing-resources) + * [Exploit Development](#exploit-development) + * [Open Sources Intelligence (OSINT) Resources](#open-sources-intelligence-osint-resources) + * [Social Engineering Resources](#social-engineering-resources) + * [Lock Picking Resources](#lock-picking-resources) + * [Operating Systems](#operating-systems) +* [Tools](#tools) + * [Penetration Testing Distributions](#penetration-testing-distributions) + * [Docker for Penetration Testing](#docker-for-penetration-testing) + * [Multi-paradigm Frameworks](#multi-paradigm-frameworks) + * [Network vulnerability scanners](#network-vulnerability-scanners) + * [Static Analyzers](#static-analyzers) + * [Web Vulnerability Scanners](#web-vulnerability-scanners) + * [Network Tools](#network-tools) + * [Exfiltration Tools](#exfiltration-tools) + * [Network Reconnaissance Tools](#network-reconnaissance-tools) + * [Protocol Analyzers and Sniffers](#protocol-analyzers-and-sniffers) + * [Proxies and MITM Tools](#proxies-and-mitm-tools) + * [Wireless Network Tools](#wireless-network-tools) + * [Transport Layer Security Tools](#transport-layer-security-tools) + * [Web Exploitation](#web-exploitation) + * [Hex Editors](#hex-editors) + * [File Format Analysis Tools](#file-format-analysis-tools) + * [Anti-virus Evasion Tools](#anti-virus-evasion-tools) + * [Hash Cracking Tools](#hash-cracking-tools) + * [Windows Utilities](#windows-utilities) + * [GNU/Linux Utilities](#gnulinux-utilities) + * [macOS Utilities](#macos-utilities) + * [DDoS Tools](#ddos-tools) + * [Social Engineering Tools](#social-engineering-tools) + * [OSINT Tools](#osint-tools) + * [Anonymity Tools](#anonymity-tools) + * [Reverse Engineering Tools](#reverse-engineering-tools) + * [Physical Access Tools](#physical-access-tools) + * [Industrial Control and SCADA Systems](#industrial-control-and-scada-systems) + * [Side-channel Tools](#side-channel-tools) + * [CTF Tools](#ctf-tools) + * [Penetration Testing Report Templates](#penetration-testing-report-templates) + * [Code examples for Penetration Testing](#code-examples-for-penetration-testing) +* [Books](#books) + * [Penetration Testing Books](#penetration-testing-books) + * [Hackers Handbook Series](#hackers-handbook-series) + * [Defensive Development](#defensive-development) + * [Network Analysis Books](#network-analysis-books) + * [Reverse Engineering Books](#reverse-engineering-books) + * [Malware Analysis Books](#malware-analysis-books) + * [Windows Books](#windows-books) + * [Social Engineering Books](#social-engineering-books) + * [Lock Picking Books](#lock-picking-books) + * [Defcon Suggested Reading](#defcon-suggested-reading) +* [Vulnerability Databases](#vulnerability-databases) +* [Security Courses](#security-courses) +* [Information Security Conferences](#information-security-conferences) +* [Information Security Magazines](#information-security-magazines) +* [Awesome Lists](#awesome-lists) ## Online Resources