preserve existing toc

This commit is contained in:
Samar Dhwoj Acharya 2019-02-18 00:57:26 -06:00 committed by GitHub
parent 3efd3ba124
commit 668da95d26
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

115
README.md
View File

@ -10,65 +10,62 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
## Contents
- [Awesome Penetration Testing ![Awesome](https://github.com/sindresorhus/awesome)](#awesome-penetration-testing-awesomehttpsgithubcomsindresorhusawesome)
- [Contents](#contents)
- [Online Resources](#online-resources)
- [Penetration Testing Resources](#penetration-testing-resources)
- [Exploit Development](#exploit-development)
- [Open Sources Intelligence (OSINT) Resources](#open-sources-intelligence-osint-resources)
- [Social Engineering Resources](#social-engineering-resources)
- [Lock Picking Resources](#lock-picking-resources)
- [Operating Systems](#operating-systems)
- [Tools](#tools)
- [Penetration Testing Distributions](#penetration-testing-distributions)
- [Docker for Penetration Testing](#docker-for-penetration-testing)
- [Multi-paradigm Frameworks](#multi-paradigm-frameworks)
- [Network vulnerability scanners](#network-vulnerability-scanners)
- [Static Analyzers](#static-analyzers)
- [Web Vulnerability Scanners](#web-vulnerability-scanners)
- [Network Tools](#network-tools)
- [Exfiltration Tools](#exfiltration-tools)
- [Network Reconnaissance Tools](#network-reconnaissance-tools)
- [Protocol Analyzers and Sniffers](#protocol-analyzers-and-sniffers)
- [Proxies and MITM Tools](#proxies-and-mitm-tools)
- [Wireless Network Tools](#wireless-network-tools)
- [Transport Layer Security Tools](#transport-layer-security-tools)
- [Web Exploitation](#web-exploitation)
- [Hex Editors](#hex-editors)
- [File Format Analysis Tools](#file-format-analysis-tools)
- [Anti-virus Evasion Tools](#anti-virus-evasion-tools)
- [Hash Cracking Tools](#hash-cracking-tools)
- [Windows Utilities](#windows-utilities)
- [GNU/Linux Utilities](#gnulinux-utilities)
- [macOS Utilities](#macos-utilities)
- [DDoS Tools](#ddos-tools)
- [Social Engineering Tools](#social-engineering-tools)
- [OSINT Tools](#osint-tools)
- [Anonymity Tools](#anonymity-tools)
- [Reverse Engineering Tools](#reverse-engineering-tools)
- [Physical Access Tools](#physical-access-tools)
- [Industrial Control and SCADA Systems](#industrial-control-and-scada-systems)
- [Side-channel Tools](#side-channel-tools)
- [CTF Tools](#ctf-tools)
- [Penetration Testing Report Templates](#penetration-testing-report-templates)
- [Code examples for Penetration Testing](#code-examples-for-penetration-testing)
- [Books](#books)
- [Penetration Testing Books](#penetration-testing-books)
- [Hackers Handbook Series](#hackers-handbook-series)
- [Defensive Development](#defensive-development)
- [Network Analysis Books](#network-analysis-books)
- [Reverse Engineering Books](#reverse-engineering-books)
- [Malware Analysis Books](#malware-analysis-books)
- [Windows Books](#windows-books)
- [Social Engineering Books](#social-engineering-books)
- [Lock Picking Books](#lock-picking-books)
- [Defcon Suggested Reading](#defcon-suggested-reading)
- [Vulnerability Databases](#vulnerability-databases)
- [Security Courses](#security-courses)
- [Information Security Conferences](#information-security-conferences)
- [Information Security Magazines](#information-security-magazines)
- [Awesome Lists](#awesome-lists)
- [License](#license)
* [Online Resources](#online-resources)
* [Penetration Testing Resources](#penetration-testing-resources)
* [Exploit Development](#exploit-development)
* [Open Sources Intelligence (OSINT) Resources](#open-sources-intelligence-osint-resources)
* [Social Engineering Resources](#social-engineering-resources)
* [Lock Picking Resources](#lock-picking-resources)
* [Operating Systems](#operating-systems)
* [Tools](#tools)
* [Penetration Testing Distributions](#penetration-testing-distributions)
* [Docker for Penetration Testing](#docker-for-penetration-testing)
* [Multi-paradigm Frameworks](#multi-paradigm-frameworks)
* [Network vulnerability scanners](#network-vulnerability-scanners)
* [Static Analyzers](#static-analyzers)
* [Web Vulnerability Scanners](#web-vulnerability-scanners)
* [Network Tools](#network-tools)
* [Exfiltration Tools](#exfiltration-tools)
* [Network Reconnaissance Tools](#network-reconnaissance-tools)
* [Protocol Analyzers and Sniffers](#protocol-analyzers-and-sniffers)
* [Proxies and MITM Tools](#proxies-and-mitm-tools)
* [Wireless Network Tools](#wireless-network-tools)
* [Transport Layer Security Tools](#transport-layer-security-tools)
* [Web Exploitation](#web-exploitation)
* [Hex Editors](#hex-editors)
* [File Format Analysis Tools](#file-format-analysis-tools)
* [Anti-virus Evasion Tools](#anti-virus-evasion-tools)
* [Hash Cracking Tools](#hash-cracking-tools)
* [Windows Utilities](#windows-utilities)
* [GNU/Linux Utilities](#gnulinux-utilities)
* [macOS Utilities](#macos-utilities)
* [DDoS Tools](#ddos-tools)
* [Social Engineering Tools](#social-engineering-tools)
* [OSINT Tools](#osint-tools)
* [Anonymity Tools](#anonymity-tools)
* [Reverse Engineering Tools](#reverse-engineering-tools)
* [Physical Access Tools](#physical-access-tools)
* [Industrial Control and SCADA Systems](#industrial-control-and-scada-systems)
* [Side-channel Tools](#side-channel-tools)
* [CTF Tools](#ctf-tools)
* [Penetration Testing Report Templates](#penetration-testing-report-templates)
* [Code examples for Penetration Testing](#code-examples-for-penetration-testing)
* [Books](#books)
* [Penetration Testing Books](#penetration-testing-books)
* [Hackers Handbook Series](#hackers-handbook-series)
* [Defensive Development](#defensive-development)
* [Network Analysis Books](#network-analysis-books)
* [Reverse Engineering Books](#reverse-engineering-books)
* [Malware Analysis Books](#malware-analysis-books)
* [Windows Books](#windows-books)
* [Social Engineering Books](#social-engineering-books)
* [Lock Picking Books](#lock-picking-books)
* [Defcon Suggested Reading](#defcon-suggested-reading)
* [Vulnerability Databases](#vulnerability-databases)
* [Security Courses](#security-courses)
* [Information Security Conferences](#information-security-conferences)
* [Information Security Magazines](#information-security-magazines)
* [Awesome Lists](#awesome-lists)
## Online Resources