mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-23 06:09:22 -05:00
Update font size
This commit is contained in:
parent
f2fb9526bd
commit
938bce3fbe
34
README.md
34
README.md
@ -1,40 +1,40 @@
|
|||||||
# Awesome Penetration Testing
|
## Awesome Penetration Testing
|
||||||
|
|
||||||
|
|
||||||
A collection of awesome penetration testing resources, tools, confs, books, magazines and other shiny things.
|
A collection of awesome penetration testing resources, tools, confs, books, magazines and other shiny things.
|
||||||
|
|
||||||
|
|
||||||
## Resources
|
### Resources
|
||||||
### Penetration Testing
|
#### Penetration Testing
|
||||||
* [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course.
|
* [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course.
|
||||||
|
|
||||||
### Social Engineering
|
#### Social Engineering
|
||||||
* [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers.
|
* [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers.
|
||||||
|
|
||||||
|
|
||||||
## Tools
|
### Tools
|
||||||
### Penetration Testing
|
#### Penetration Testing
|
||||||
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
|
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
|
||||||
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
|
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
|
||||||
|
|
||||||
### Social Engineering
|
#### Social Engineering
|
||||||
* [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec
|
* [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec
|
||||||
|
|
||||||
### Anonimity
|
#### Anonimity
|
||||||
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity.
|
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity.
|
||||||
* [I2P](https://geti2p.net) - The Invisible Internet Project
|
* [I2P](https://geti2p.net) - The Invisible Internet Project
|
||||||
|
|
||||||
### Networks tools
|
#### Networks tools
|
||||||
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc.
|
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc.
|
||||||
|
|
||||||
### Hex editors
|
#### Hex editors
|
||||||
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing.
|
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing.
|
||||||
|
|
||||||
### Windows utils
|
#### Windows utils
|
||||||
* [Sysinternals Suite](http://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities
|
* [Sysinternals Suite](http://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities
|
||||||
|
|
||||||
|
|
||||||
## Conferences
|
### Conferences
|
||||||
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas.
|
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas.
|
||||||
* [Black Hat](http://www.blackhat.com/) - An annual security conference in Las Vegas.
|
* [Black Hat](http://www.blackhat.com/) - An annual security conference in Las Vegas.
|
||||||
* [BSides](http://www.securitybsides.com/) - A framework for organising and holding security conferences.
|
* [BSides](http://www.securitybsides.com/) - A framework for organising and holding security conferences.
|
||||||
@ -55,16 +55,16 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
|
|||||||
* [SkyDogCon](http://www.skydogcon.com/) - A technology conference in Nashville.
|
* [SkyDogCon](http://www.skydogcon.com/) - A technology conference in Nashville.
|
||||||
|
|
||||||
|
|
||||||
## Books
|
### Books
|
||||||
### Penetration Testing
|
#### Penetration Testing
|
||||||
* [The Art of Exploitation by Jon Erickson, 2008](http://www.nostarch.com/hacking2.htm)
|
* [The Art of Exploitation by Jon Erickson, 2008](http://www.nostarch.com/hacking2.htm)
|
||||||
* [Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011](http://www.nostarch.com/metasploit)
|
* [Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011](http://www.nostarch.com/metasploit)
|
||||||
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting)
|
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting)
|
||||||
|
|
||||||
### Windows
|
#### Windows
|
||||||
* [Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu](http://technet.microsoft.com/en-us/sysinternals/bb963901.aspx)
|
* [Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu](http://technet.microsoft.com/en-us/sysinternals/bb963901.aspx)
|
||||||
|
|
||||||
### Social Engineering
|
#### Social Engineering
|
||||||
* [The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002](http://wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
|
* [The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002](http://wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
|
||||||
* [The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005](http://wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
|
* [The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005](http://wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
|
||||||
* [Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011](http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/)
|
* [Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011](http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/)
|
||||||
@ -73,6 +73,6 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
|
|||||||
* [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html)
|
* [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html)
|
||||||
|
|
||||||
|
|
||||||
## Magazines
|
### Magazines
|
||||||
* [2600: The Hacker Quarterly](http://www.2600.com/Magazine/DigitalEditions) - An American publication about technology and computer "underground".
|
* [2600: The Hacker Quarterly](http://www.2600.com/Magazine/DigitalEditions) - An American publication about technology and computer "underground".
|
||||||
* [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security.
|
* [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security.
|
Loading…
Reference in New Issue
Block a user