mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2025-01-09 06:07:55 -05:00
Merge pull request #384 from fabacab/fix-ms-links
Fixes the Travis CI build by removing several outdated links.
This commit is contained in:
commit
95bb192b5e
10
README.md
10
README.md
@ -471,7 +471,6 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools).
|
||||
|
||||
### Online Penetration Testing Resources
|
||||
|
||||
* [InfoSec Institute](https://resources.infosecinstitute.com) - IT and security articles.
|
||||
* [MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)](https://attack.mitre.org/) - Curated knowledge base and model for cyber adversary behavior.
|
||||
* [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security Metasploit course.
|
||||
* [Open Web Application Security Project (OWASP)](https://www.owasp.org/index.php/Main_Page) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
|
||||
@ -498,7 +497,6 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools).
|
||||
* [Honeypots](https://github.com/paralax/awesome-honeypots) - Honeypots, tools, components, and more.
|
||||
* [InfoSec § Hacking challenges](https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges) - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
|
||||
* [Infosec](https://github.com/onlurking/awesome-infosec) - Information security resources for pentesting, forensics, and more.
|
||||
* [Security-related Operating Systems](https://list.rawsec.ml/operating_systems.html) - List of security related operating systems.
|
||||
* [JavaScript Programming](https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting.
|
||||
* [Kali Linux Tools](http://tools.kali.org/tools-listing) - List of tools present in Kali Linux.
|
||||
* [Node.js Programming by @sindresorhus](https://github.com/sindresorhus/awesome-nodejs) - Curated list of delightful Node.js packages and resources.
|
||||
@ -598,7 +596,6 @@ See also [awesome-osint](https://github.com/jivoi/awesome-osint).
|
||||
* [Android Tamer](https://androidtamer.com/) - Distribution built for Android security professionals that includes tools required for Android security testing.
|
||||
* [ArchStrike](https://archstrike.org/) - Arch GNU/Linux repository for security professionals and enthusiasts.
|
||||
* [AttifyOS](https://github.com/adi0x90/attifyos) - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
|
||||
* [BackBox](https://backbox.org/) - Ubuntu-based distribution for penetration tests and security assessments.
|
||||
* [BlackArch](https://www.blackarch.org/) - Arch GNU/Linux-based distribution for penetration testers and security researchers.
|
||||
* [Buscador](https://inteltechniques.com/buscador/) - GNU/Linux virtual machine that is pre-configured for online investigators.
|
||||
* [Kali](https://www.kali.org/) - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
|
||||
@ -658,7 +655,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing), [*
|
||||
* [Radare2](http://rada.re/r/index.html) - Open source, crossplatform reverse engineering framework.
|
||||
* [UEFITool](https://github.com/LongSoft/UEFITool) - UEFI firmware image viewer and editor.
|
||||
* [Voltron](https://github.com/snare/voltron) - Extensible debugger UI toolkit written in Python.
|
||||
* [WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.
|
||||
* [WDK/WinDbg](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools) - Windows Driver Kit and WinDbg.
|
||||
* [binwalk](https://github.com/devttys0/binwalk) - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
|
||||
* [boxxy](https://github.com/kpcyrd/boxxy-rs) - Linkable sandbox explorer.
|
||||
* [dnSpy](https://github.com/0xd4d/dnSpy) - Tool to reverse engineer .NET assemblies.
|
||||
@ -748,8 +745,7 @@ See also [awesome-social-engineering](https://github.com/v2-dev/awesome-social-e
|
||||
* [GitHub Advisories](https://github.com/advisories/) - Public vulnerability advisories published by or affecting codebases hosted by GitHub, including open source projects.
|
||||
* [HPI-VDB](https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
|
||||
* [Inj3ct0r](https://www.0day.today/) - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
|
||||
* [Microsoft Security Advisories](https://technet.microsoft.com/en-us/security/advisories#APUMA) - Archive of security advisories impacting Microsoft software.
|
||||
* [Microsoft Security Bulletins](https://technet.microsoft.com/en-us/security/bulletins#sec_search) - Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).
|
||||
* [Microsoft Security Advisories and Bulletins](https://docs.microsoft.com/en-us/security-updates/) - Archive and announcements of security advisories impacting Microsoft software, published by the Microsoft Security Response Center (MSRC).
|
||||
* [Mozilla Foundation Security Advisories](https://www.mozilla.org/security/advisories/) - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
|
||||
* [National Vulnerability Database (NVD)](https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
|
||||
* [Packet Storm](https://packetstormsecurity.com/files/) - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
|
||||
@ -820,7 +816,7 @@ See also [awesome-social-engineering](https://github.com/v2-dev/awesome-social-e
|
||||
* [Rubeus](https://github.com/GhostPack/Rubeus) - Toolset for raw Kerberos interaction and abuses.
|
||||
* [Ruler](https://github.com/sensepost/ruler) - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server.
|
||||
* [SCOMDecrypt](https://github.com/nccgroup/SCOMDecrypt) - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases.
|
||||
* [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities.
|
||||
* [Sysinternals Suite](https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite) - The Sysinternals Troubleshooting Utilities.
|
||||
* [Windows Credentials Editor](https://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
|
||||
* [Windows Exploit Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Detects potential missing patches on the target.
|
||||
* [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.
|
||||
|
Loading…
Reference in New Issue
Block a user