mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-10-01 01:05:56 -04:00
Add Vulnerability Databases section
This commit is contained in:
parent
e3475aa5cb
commit
bbc4062e33
124
README.md
124
README.md
@ -1,7 +1,7 @@
|
||||
## Awesome Penetration Testing
|
||||
|
||||
|
||||
A collection of awesome penetration testing resources, tools, books, , confs, magazines and other shiny things.
|
||||
A collection of awesome penetration testing resources, tools, books, , confs, magazines and other shiny things
|
||||
|
||||
|
||||
- [Online Resources](#online-resources)
|
||||
@ -28,8 +28,8 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
||||
- [Windows Books](#windows-books)
|
||||
- [Social Engineering Books](#social-engineering-books)
|
||||
- [Lock Picking Books](#lock-picking-books)
|
||||
- [Vulnerability Lists](#vulnerability-lists)
|
||||
- [Courses](#courses)
|
||||
- [Vulnerability Databases](#vulnerability-databases)
|
||||
- [Security Courses](#security-courses)
|
||||
- [Information Security Conferences](#information-security-conferences)
|
||||
- [Information Security Magazines](#information-security-magazines)
|
||||
- [Awesome Lists](#awesome-lists)
|
||||
@ -39,57 +39,56 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
||||
|
||||
### Online Resources
|
||||
#### Penetration Testing Resources
|
||||
* [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course.
|
||||
* [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course
|
||||
* [PTES](http://www.pentest-standard.org/) - Pen Test Execution Standard
|
||||
|
||||
#### Shell Scripting Resources
|
||||
* [LSST](http://www.freeos.com/guides/lsst/) - Linux Shell Scripting Tutorial.
|
||||
* [LSST](http://www.freeos.com/guides/lsst/) - Linux Shell Scripting Tutorial
|
||||
|
||||
#### Linux resources
|
||||
* [Kernelnewbies](http://kernelnewbies.org/) - A community of aspiring Linux kernel developers who work to improve their Kernels.
|
||||
* [Kernelnewbies](http://kernelnewbies.org/) - A community of aspiring Linux kernel developers who work to improve their Kernels
|
||||
|
||||
#### Social Engineering Resources
|
||||
* [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers.
|
||||
* [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers
|
||||
|
||||
|
||||
### Tools
|
||||
#### Penetration Testing Tools
|
||||
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
|
||||
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
|
||||
* [Burp](http://portswigger.net/burp/) - An integrated platform for performing security testing of web applications.
|
||||
|
||||
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing
|
||||
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software
|
||||
* [Burp](http://portswigger.net/burp/) - An integrated platform for performing security testing of web applications
|
||||
#### Vulnerability Scanners
|
||||
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Vulnerability Management & Risk Management Software.
|
||||
* [Nessus](http://www.tenable.com/products/nessus) - Vulnerability, configuration, and compliance assessment.
|
||||
* [OpenVAS](http://www.openvas.org/) - Open Source vulnerability scanner and manager.
|
||||
* [w3af](https://github.com/andresriancho/w3af) - Web application attack and audit framework.
|
||||
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Vulnerability Management & Risk Management Software
|
||||
* [Nessus](http://www.tenable.com/products/nessus) - Vulnerability, configuration, and compliance assessment
|
||||
* [OpenVAS](http://www.openvas.org/) - Open Source vulnerability scanner and manager
|
||||
* [w3af](https://github.com/andresriancho/w3af) - Web application attack and audit framework
|
||||
|
||||
#### Networks Tools
|
||||
* [nmap](http://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits.
|
||||
* [tcpdump/libpcap](http://www.tcpdump.org/) - A common packet analyzer that runs under the command line.
|
||||
* [Wireshark](http://www.wireshark.org/) - A network protocol analyzer for Unix and Windows.
|
||||
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc.
|
||||
* [nmap](http://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits
|
||||
* [tcpdump/libpcap](http://www.tcpdump.org/) - A common packet analyzer that runs under the command line
|
||||
* [Wireshark](http://www.wireshark.org/) - A network protocol analyzer for Unix and Windows
|
||||
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc
|
||||
|
||||
#### Hex Editors
|
||||
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing.
|
||||
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing
|
||||
|
||||
#### Windows Utils
|
||||
* [Sysinternals Suite](http://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities
|
||||
|
||||
#### DDoS Tools
|
||||
* [LOIC](https://github.com/NewEraCracker/LOIC/) - An open source network stress tool for Windows.
|
||||
* [JS LOIC](http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html) - JavaScript in-browser version of LOIC.
|
||||
* [LOIC](https://github.com/NewEraCracker/LOIC/) - An open source network stress tool for Windows
|
||||
* [JS LOIC](http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html) - JavaScript in-browser version of LOIC
|
||||
|
||||
#### Social Engineering Tools
|
||||
* [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec
|
||||
|
||||
#### Anonimity Tools
|
||||
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity.
|
||||
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity
|
||||
* [I2P](https://geti2p.net) - The Invisible Internet Project
|
||||
|
||||
#### Reverse Engineering Tools
|
||||
* [IDA Pro](https://www.hex-rays.com/products/ida/) - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger.
|
||||
* [WDK/WinDbg](http://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.
|
||||
* [IDA Pro](https://www.hex-rays.com/products/ida/) - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
|
||||
* [WDK/WinDbg](http://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg
|
||||
* [OllyDbg](http://www.ollydbg.de/) - An x86 debugger that emphasizes binary code analysis
|
||||
|
||||
|
||||
@ -140,54 +139,57 @@ A collection of awesome penetration testing resources, tools, books, , confs, ma
|
||||
* [Practical Lock Picking by Deviant Ollam, 2012](https://www.elsevier.com/books/practical-lock-picking/ollam/978-1-59749-989-7)
|
||||
* [Keys to the Kingdom by Deviant Ollam, 2012](https://www.elsevier.com/books/keys-to-the-kingdom/ollam/978-1-59749-983-5)
|
||||
|
||||
### Vulnerability Databases
|
||||
* [NVD](http://nvd.nist.gov/) - US National Vulnerability Database
|
||||
* [CERT](http://www.us-cert.gov/) - US Computer Emergency Readiness Team
|
||||
|
||||
### Courses
|
||||
### Security Courses
|
||||
* [Offensive Security Training](http://www.offensive-security.com/information-security-training/) - Training from BackTrack/Kali developers
|
||||
* [SANS Security Training](http://www.sans.org/) - Computer Security Training & Certification
|
||||
|
||||
|
||||
### Information Security Conferences
|
||||
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas.
|
||||
* [Black Hat](http://www.blackhat.com/) - An annual security conference in Las Vegas.
|
||||
* [BSides](http://www.securitybsides.com/) - A framework for organising and holding security conferences.
|
||||
* [CCC](http://events.ccc.de/congress/) - An annual meeting of the international hacker scene in Germany.
|
||||
* [DerbyCon](https://www.derbycon.com/) - An annual hacker conference based in Louisville.
|
||||
* [PhreakNIC](http://phreaknic.info/) - A technology conference held annually in middle Tennessee.
|
||||
* [ShmooCon](http://www.shmoocon.org/) - An annual US east coast hacker convention.
|
||||
* [CarolinaCon](http://www.carolinacon.org/) - An infosec conference, held annually in North Carolina.
|
||||
* [HOPE](http://hope.net/) - A conference series sponsored by the hacker magazine 2600.
|
||||
* [SummerCon](http://www.summercon.org/) - One of the oldest hacker conventions, held during Summer.
|
||||
* [Hack.lu](http://hack.lu/) - An annual conference held in Luxembourg.
|
||||
* [HITB](http://conference.hitb.org/) - Deep-knowledge security conference held in Malaysia and The Netherlands.
|
||||
* [Troopers](https://www.troopers.de) - Annual international IT Security event with workshops held in Heidelberg, Germany.
|
||||
* [Hack3rCon](http://hack3rcon.org/) - An annual US hacker conference.
|
||||
* [ThotCon](http://thotcon.org/) - An annual US hacker conference held in Chicago.
|
||||
* [LayerOne](http://www.layerone.org/) - An annual US security conerence held every spring in Los Angeles.
|
||||
* [DeepSec](https://deepsec.net/) - Security Conference in Vienna, Austria.
|
||||
* [SkyDogCon](http://www.skydogcon.com/) - A technology conference in Nashville.
|
||||
* [DEF CON](https://www.defcon.org/) - An annual hacker convention in Las Vegas
|
||||
* [Black Hat](http://www.blackhat.com/) - An annual security conference in Las Vegas
|
||||
* [BSides](http://www.securitybsides.com/) - A framework for organising and holding security conferences
|
||||
* [CCC](http://events.ccc.de/congress/) - An annual meeting of the international hacker scene in Germany
|
||||
* [DerbyCon](https://www.derbycon.com/) - An annual hacker conference based in Louisville
|
||||
* [PhreakNIC](http://phreaknic.info/) - A technology conference held annually in middle Tennessee
|
||||
* [ShmooCon](http://www.shmoocon.org/) - An annual US east coast hacker convention
|
||||
* [CarolinaCon](http://www.carolinacon.org/) - An infosec conference, held annually in North Carolina
|
||||
* [HOPE](http://hope.net/) - A conference series sponsored by the hacker magazine 2600
|
||||
* [SummerCon](http://www.summercon.org/) - One of the oldest hacker conventions, held during Summer
|
||||
* [Hack.lu](http://hack.lu/) - An annual conference held in Luxembourg
|
||||
* [HITB](http://conference.hitb.org/) - Deep-knowledge security conference held in Malaysia and The Netherlands
|
||||
* [Troopers](https://www.troopers.de) - Annual international IT Security event with workshops held in Heidelberg, Germany
|
||||
* [Hack3rCon](http://hack3rcon.org/) - An annual US hacker conference
|
||||
* [ThotCon](http://thotcon.org/) - An annual US hacker conference held in Chicago
|
||||
* [LayerOne](http://www.layerone.org/) - An annual US security conerence held every spring in Los Angeles
|
||||
* [DeepSec](https://deepsec.net/) - Security Conference in Vienna, Austria
|
||||
* [SkyDogCon](http://www.skydogcon.com/) - A technology conference in Nashville
|
||||
|
||||
|
||||
### Information Security Magazines
|
||||
* [2600: The Hacker Quarterly](http://www.2600.com/Magazine/DigitalEditions) - An American publication about technology and computer "underground".
|
||||
* [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security.
|
||||
* [2600: The Hacker Quarterly](http://www.2600.com/Magazine/DigitalEditions) - An American publication about technology and computer "underground"
|
||||
* [Hakin9](https://hakin9.org/) - A Polish online, weekly publication on IT Security
|
||||
|
||||
|
||||
### Awesome Lists
|
||||
* [SecTools](http://sectools.org/) - Top 125 Network Security Tools
|
||||
* [C/C++ Programming](https://github.com/fffaraz/awesome-cpp) - One of the main language for open source security tools.
|
||||
* [.NET Programming](https://github.com/quozd/awesome-dotnet) - A software framework for Microsoft Windows platform development.
|
||||
* [Shell Scripting](https://github.com/alebcay/awesome-shell) - Command-line frameworks, toolkits, guides and gizmos.
|
||||
* [Ruby Programming by @dreikanter](https://github.com/dreikanter/ruby-bookmarks) - The de-facto language for writing exploits.
|
||||
* [Ruby Programming by @markets](https://github.com/markets/awesome-ruby) - The de-facto language for writing exploits.
|
||||
* [Ruby Programming by @Sdogruyol](https://github.com/Sdogruyol/awesome-ruby) - The de-facto language for writing exploits.
|
||||
* [JavaScript Programming](https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting.
|
||||
* [Node.js Programming by @sindresorhus](https://github.com/sindresorhus/awesome-nodejs) - JavaScript in command-line.
|
||||
* [Node.js Programming by @vndmtrx](https://github.com/vndmtrx/awesome-nodejs) - JavaScript in command-line.
|
||||
* [Python tools for penetration testers](http://www.dirk-loss.de/python-tools.htm) - Lots of pentesting tools are written in Python.
|
||||
* [Python Programming by @svaksha](https://github.com/svaksha/pythonidae) - General Python programming.
|
||||
* [Python Programming by @vinta](https://github.com/vinta/awesome-python) - General Python programming.
|
||||
* [Andorid Security](https://github.com/ashishb/android-security-awesome) - A collection of android security related resources.
|
||||
* [Awesome Awesomness](https://github.com/bayandin/awesome-awesomeness) - The List of the Lists.
|
||||
* [C/C++ Programming](https://github.com/fffaraz/awesome-cpp) - One of the main language for open source security tools
|
||||
* [.NET Programming](https://github.com/quozd/awesome-dotnet) - A software framework for Microsoft Windows platform development
|
||||
* [Shell Scripting](https://github.com/alebcay/awesome-shell) - Command-line frameworks, toolkits, guides and gizmos
|
||||
* [Ruby Programming by @dreikanter](https://github.com/dreikanter/ruby-bookmarks) - The de-facto language for writing exploits
|
||||
* [Ruby Programming by @markets](https://github.com/markets/awesome-ruby) - The de-facto language for writing exploits
|
||||
* [Ruby Programming by @Sdogruyol](https://github.com/Sdogruyol/awesome-ruby) - The de-facto language for writing exploits
|
||||
* [JavaScript Programming](https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting
|
||||
* [Node.js Programming by @sindresorhus](https://github.com/sindresorhus/awesome-nodejs) - JavaScript in command-line
|
||||
* [Node.js Programming by @vndmtrx](https://github.com/vndmtrx/awesome-nodejs) - JavaScript in command-line
|
||||
* [Python tools for penetration testers](http://www.dirk-loss.de/python-tools.htm) - Lots of pentesting tools are written in Python
|
||||
* [Python Programming by @svaksha](https://github.com/svaksha/pythonidae) - General Python programming
|
||||
* [Python Programming by @vinta](https://github.com/vinta/awesome-python) - General Python programming
|
||||
* [Andorid Security](https://github.com/ashishb/android-security-awesome) - A collection of android security related resources
|
||||
* [Awesome Awesomness](https://github.com/bayandin/awesome-awesomeness) - The List of the Lists
|
||||
|
||||
|
||||
### Contribution
|
||||
@ -197,4 +199,4 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕)
|
||||
|
||||
[![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)](http://creativecommons.org/licenses/by/4.0/)
|
||||
|
||||
This work is licensed under a [Creative Commons Attribution 4.0 International License](http://creativecommons.org/licenses/by/4.0/).
|
||||
This work is licensed under a [Creative Commons Attribution 4.0 International License](http://creativecommons.org/licenses/by/4.0/)
|
Loading…
Reference in New Issue
Block a user