From 49cfdff19ecb095534c031349ebb2ff466f85f48 Mon Sep 17 00:00:00 2001 From: fabacab Date: Sun, 23 Aug 2020 15:43:07 -0400 Subject: [PATCH 1/2] Fix redirecting links to Microsoft resources. --- README.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 3870929..8ce9808 100644 --- a/README.md +++ b/README.md @@ -658,7 +658,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing), [* * [Radare2](http://rada.re/r/index.html) - Open source, crossplatform reverse engineering framework. * [UEFITool](https://github.com/LongSoft/UEFITool) - UEFI firmware image viewer and editor. * [Voltron](https://github.com/snare/voltron) - Extensible debugger UI toolkit written in Python. -* [WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg. +* [WDK/WinDbg](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools) - Windows Driver Kit and WinDbg. * [binwalk](https://github.com/devttys0/binwalk) - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images. * [boxxy](https://github.com/kpcyrd/boxxy-rs) - Linkable sandbox explorer. * [dnSpy](https://github.com/0xd4d/dnSpy) - Tool to reverse engineer .NET assemblies. @@ -748,8 +748,7 @@ See also [awesome-social-engineering](https://github.com/v2-dev/awesome-social-e * [GitHub Advisories](https://github.com/advisories/) - Public vulnerability advisories published by or affecting codebases hosted by GitHub, including open source projects. * [HPI-VDB](https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam. * [Inj3ct0r](https://www.0day.today/) - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).) -* [Microsoft Security Advisories](https://technet.microsoft.com/en-us/security/advisories#APUMA) - Archive of security advisories impacting Microsoft software. -* [Microsoft Security Bulletins](https://technet.microsoft.com/en-us/security/bulletins#sec_search) - Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC). +* [Microsoft Security Advisories and Bulletins](https://docs.microsoft.com/en-us/security-updates/) - Archive and announcements of security advisories impacting Microsoft software, published by the Microsoft Security Response Center (MSRC). * [Mozilla Foundation Security Advisories](https://www.mozilla.org/security/advisories/) - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser. * [National Vulnerability Database (NVD)](https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine. * [Packet Storm](https://packetstormsecurity.com/files/) - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry. @@ -820,7 +819,7 @@ See also [awesome-social-engineering](https://github.com/v2-dev/awesome-social-e * [Rubeus](https://github.com/GhostPack/Rubeus) - Toolset for raw Kerberos interaction and abuses. * [Ruler](https://github.com/sensepost/ruler) - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server. * [SCOMDecrypt](https://github.com/nccgroup/SCOMDecrypt) - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases. -* [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities. +* [Sysinternals Suite](https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite) - The Sysinternals Troubleshooting Utilities. * [Windows Credentials Editor](https://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets. * [Windows Exploit Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Detects potential missing patches on the target. * [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system. From f721f8c96fe712cc2d626ed80287e334130f6b7a Mon Sep 17 00:00:00 2001 From: fabacab Date: Sun, 23 Aug 2020 15:52:19 -0400 Subject: [PATCH 2/2] Remove broken (unresponsive, invalid TLS cert) links. --- README.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/README.md b/README.md index 8ce9808..3a09156 100644 --- a/README.md +++ b/README.md @@ -471,7 +471,6 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools). ### Online Penetration Testing Resources -* [InfoSec Institute](https://resources.infosecinstitute.com) - IT and security articles. * [MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)](https://attack.mitre.org/) - Curated knowledge base and model for cyber adversary behavior. * [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security Metasploit course. * [Open Web Application Security Project (OWASP)](https://www.owasp.org/index.php/Main_Page) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software. @@ -498,7 +497,6 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools). * [Honeypots](https://github.com/paralax/awesome-honeypots) - Honeypots, tools, components, and more. * [InfoSec ยง Hacking challenges](https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges) - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more. * [Infosec](https://github.com/onlurking/awesome-infosec) - Information security resources for pentesting, forensics, and more. -* [Security-related Operating Systems](https://list.rawsec.ml/operating_systems.html) - List of security related operating systems. * [JavaScript Programming](https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting. * [Kali Linux Tools](http://tools.kali.org/tools-listing) - List of tools present in Kali Linux. * [Node.js Programming by @sindresorhus](https://github.com/sindresorhus/awesome-nodejs) - Curated list of delightful Node.js packages and resources. @@ -598,7 +596,6 @@ See also [awesome-osint](https://github.com/jivoi/awesome-osint). * [Android Tamer](https://androidtamer.com/) - Distribution built for Android security professionals that includes tools required for Android security testing. * [ArchStrike](https://archstrike.org/) - Arch GNU/Linux repository for security professionals and enthusiasts. * [AttifyOS](https://github.com/adi0x90/attifyos) - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments. -* [BackBox](https://backbox.org/) - Ubuntu-based distribution for penetration tests and security assessments. * [BlackArch](https://www.blackarch.org/) - Arch GNU/Linux-based distribution for penetration testers and security researchers. * [Buscador](https://inteltechniques.com/buscador/) - GNU/Linux virtual machine that is pre-configured for online investigators. * [Kali](https://www.kali.org/) - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.