Update font size

This commit is contained in:
Nick Raienko 2014-08-04 21:29:52 +03:00
parent f2fb9526bd
commit 938bce3fbe

View File

@ -1,40 +1,40 @@
# Awesome Penetration Testing ## Awesome Penetration Testing
A collection of awesome penetration testing resources, tools, confs, books, magazines and other shiny things. A collection of awesome penetration testing resources, tools, confs, books, magazines and other shiny things.
## Resources ### Resources
### Penetration Testing #### Penetration Testing
* [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course. * [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course.
### Social Engineering #### Social Engineering
* [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers. * [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers.
## Tools ### Tools
### Penetration Testing #### Penetration Testing
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing. * [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software. * [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
### Social Engineering #### Social Engineering
* [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec * [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec
### Anonimity #### Anonimity
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity. * [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity.
* [I2P](https://geti2p.net) - The Invisible Internet Project * [I2P](https://geti2p.net) - The Invisible Internet Project
### Networks tools #### Networks tools
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc. * [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc.
### Hex editors #### Hex editors
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing. * [HexEdit.js](http://hexed.it/) - Browser-based hex editing.
### Windows utils #### Windows utils
* [Sysinternals Suite](http://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities * [Sysinternals Suite](http://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities
## Conferences ### Conferences
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas. * [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas.
* [Black Hat](http://www.blackhat.com/) - An annual security conference in Las Vegas. * [Black Hat](http://www.blackhat.com/) - An annual security conference in Las Vegas.
* [BSides](http://www.securitybsides.com/) - A framework for organising and holding security conferences. * [BSides](http://www.securitybsides.com/) - A framework for organising and holding security conferences.
@ -55,16 +55,16 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
* [SkyDogCon](http://www.skydogcon.com/) - A technology conference in Nashville. * [SkyDogCon](http://www.skydogcon.com/) - A technology conference in Nashville.
## Books ### Books
### Penetration Testing #### Penetration Testing
* [The Art of Exploitation by Jon Erickson, 2008](http://www.nostarch.com/hacking2.htm) * [The Art of Exploitation by Jon Erickson, 2008](http://www.nostarch.com/hacking2.htm)
* [Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011](http://www.nostarch.com/metasploit) * [Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011](http://www.nostarch.com/metasploit)
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting) * [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting)
### Windows #### Windows
* [Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu](http://technet.microsoft.com/en-us/sysinternals/bb963901.aspx) * [Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu](http://technet.microsoft.com/en-us/sysinternals/bb963901.aspx)
### Social Engineering #### Social Engineering
* [The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002](http://wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html) * [The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002](http://wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
* [The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005](http://wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html) * [The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005](http://wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
* [Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011](http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/) * [Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011](http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/)
@ -73,6 +73,6 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
* [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html) * [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html)
## Magazines ### Magazines
* [2600: The Hacker Quarterly](http://www.2600.com/Magazine/DigitalEditions) - An American publication about technology and computer "underground". * [2600: The Hacker Quarterly](http://www.2600.com/Magazine/DigitalEditions) - An American publication about technology and computer "underground".
* [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security. * [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security.