Update README.md

This commit is contained in:
Mark 2024-06-14 10:35:54 -04:00 committed by GitHub
parent 2e0aebe9a3
commit 6aea3543d5
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -481,6 +481,7 @@ See also *[Intercepting Web proxies](#intercepting-web-proxies)*.
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
* [OpenVAS](http://www.openvas.org/) - Free software implementation of the popular Nessus vulnerability assessment system.
* [Vuls](https://github.com/future-architect/vuls) - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
* [BadUSB VulnerabilityScanner](https://github.com/MarkCyber/BadUSB/blob/main/HackStuff/VulnerabilityScanner.txt) - This badUSB script scans a device for potential vulnerabilities and exports all results to a secondary USB. The information extracted includes open ports, password policies, misconfigured software, antivirus and firewall rules, logs, and more. This was created by [MarkCyber](https://www.github.com/MarkCyber)
### Web Vulnerability Scanners
@ -673,6 +674,7 @@ See also *[Web-accessible source code ripping tools](#web-accessible-source-code
* [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
* [Thunderclap](https://thunderclap.io/) - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
* [USB Rubber Ducky](http://usbrubberducky.com/) - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.
* [Flipper Zero](https://shop.flipperzero.one) - An open source portable multi-tool for penetration testing that can read and transmit subghz radio frequency, brute force signals such as RFID, Infrared, NFC, as well as act as a BadUSB and more.
## Privilege Escalation Tools