mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-10-01 01:05:56 -04:00
commit
d8d4848e6e
@ -41,6 +41,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
- [Physical Access Tools](#physical-access-tools)
|
- [Physical Access Tools](#physical-access-tools)
|
||||||
- [Side-channel Tools](#side-channel-tools)
|
- [Side-channel Tools](#side-channel-tools)
|
||||||
- [CTF Tools](#ctf-tools)
|
- [CTF Tools](#ctf-tools)
|
||||||
|
- [Penetration Testing Report Templates](#penetration-testing-report-templates)
|
||||||
- [Books](#books)
|
- [Books](#books)
|
||||||
- [Penetration Testing Books](#penetration-testing-books)
|
- [Penetration Testing Books](#penetration-testing-books)
|
||||||
- [Hackers Handbook Series](#hackers-handbook-series)
|
- [Hackers Handbook Series](#hackers-handbook-series)
|
||||||
@ -363,6 +364,14 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.
|
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.
|
||||||
* [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
|
* [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
|
||||||
|
|
||||||
|
### Penetration Testing Report Templates
|
||||||
|
* [Public Pentesting Reports](https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups
|
||||||
|
* [Pentesting Report Template](https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - testandverification.com template
|
||||||
|
* [Pentesting Report Template](https://www.hitachi-systems-security.com/wp-content/uploads/Above-Security-Technical-Security-Audit-Demo-Report_En_FINAL.pdf) - hitachi-systems-security.com template
|
||||||
|
* [Pentesting Report Template](http://lucideus.com/pdf/stw.pdf) - lucideus.com template
|
||||||
|
* [Pentesting Report Template](https://www.crest-approved.org/wp-content/uploads/CREST-Penetration-Testing-Guide.pdf) - crest-approved.org templage
|
||||||
|
* [Pentesting Report Template](https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf) - pcisecuritystandards.org template
|
||||||
|
|
||||||
## Books
|
## Books
|
||||||
### Penetration Testing Books
|
### Penetration Testing Books
|
||||||
* [The Art of Exploitation by Jon Erickson, 2008](https://www.nostarch.com/hacking2.htm)
|
* [The Art of Exploitation by Jon Erickson, 2008](https://www.nostarch.com/hacking2.htm)
|
||||||
|
Loading…
Reference in New Issue
Block a user