From 8c05fbd8573af8e7ae4d959d0a01a4a3cac9ef23 Mon Sep 17 00:00:00 2001 From: Nick Raienko Date: Wed, 6 Aug 2014 11:17:27 +0300 Subject: [PATCH] Update table of contents --- README.md | 57 +++++++++++++++++++++++++++---------------------------- 1 file changed, 28 insertions(+), 29 deletions(-) diff --git a/README.md b/README.md index c321200..88b8561 100644 --- a/README.md +++ b/README.md @@ -4,35 +4,34 @@ A collection of awesome penetration testing resources, tools, books, , confs, magazines and other shiny things. -- [Awesome Penetration Testing](#awesome-penetration-testing) - - [Online Resources](#online-resources) - - [Penetration Testing Resources](#penetration-testing-resources) - - [Shell Scripting Resources](#shell-scripting-resources) - - [Linux Resources](#linux-resources) - - [Social Engineering Resources](#social-engineering-resources) - - [Tools](#tools) - - [Penetration Testing Tools](#penetration-testing-tools) - - [Vulnerability Scanners](#vulnerability-scanners) - - [Network Tools](#network-tools) - - [Hex Editors](#hex-editors) - - [Windows Utils](#windows-utils) - - [DDoS Tools](#ddos-tools) - - [Social Engineering Tools](#social-engineering-tools) - - [Anonimity Tools](#anonimity-tools) - - [Reverse Engineering Tools](#reverse-engineering-tools) - - [Books](#books) - - [Penetration Testing Books](#penetration-testing-books) - - [Hackers Handbook Series](#hackers-handbook-series) - - [Network Analysis Books](#network-analysis-books) - - [Reverse Engineering Books](#reverse-engineering-books) - - [Malware Analysis Books](#malware-analysis-books) - - [Windows Books](#windows-books) - - [Social Engineering Books](#social-engineering-books) - - [Information Security Conferences](#information-security-conferences) - - [Information Security Magazines](#information-security-magazines) - - [Awesome Lists](#awesome-lists) - - [Contribution](#contribution) - - [License](#license) +- [Online Resources](#online-resources) + - [Penetration Testing Resources](#penetration-testing-resources) + - [Shell Scripting Resources](#shell-scripting-resources) + - [Linux Resources](#linux-resources) + - [Social Engineering Resources](#social-engineering-resources) +- [Tools](#tools) + - [Penetration Testing Tools](#penetration-testing-tools) + - [Vulnerability Scanners](#vulnerability-scanners) + - [Network Tools](#network-tools) + - [Hex Editors](#hex-editors) + - [Windows Utils](#windows-utils) + - [DDoS Tools](#ddos-tools) + - [Social Engineering Tools](#social-engineering-tools) + - [Anonimity Tools](#anonimity-tools) + - [Reverse Engineering Tools](#reverse-engineering-tools) +- [Books](#books) + - [Penetration Testing Books](#penetration-testing-books) + - [Hackers Handbook Series](#hackers-handbook-series) + - [Network Analysis Books](#network-analysis-books) + - [Reverse Engineering Books](#reverse-engineering-books) + - [Malware Analysis Books](#malware-analysis-books) + - [Windows Books](#windows-books) + - [Social Engineering Books](#social-engineering-books) +- [Information Security Conferences](#information-security-conferences) +- [Information Security Magazines](#information-security-magazines) +- [Awesome Lists](#awesome-lists) +- [Contribution](#contribution) +- [License](#license) ### Online Resources