Merge pull request #1 from sheimo/sheimo-patch-1

Update README.md
This commit is contained in:
sheimo 2017-08-31 17:06:21 -05:00 committed by GitHub
commit d8d4848e6e

View File

@ -41,6 +41,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
- [Physical Access Tools](#physical-access-tools) - [Physical Access Tools](#physical-access-tools)
- [Side-channel Tools](#side-channel-tools) - [Side-channel Tools](#side-channel-tools)
- [CTF Tools](#ctf-tools) - [CTF Tools](#ctf-tools)
- [Penetration Testing Report Templates](#penetration-testing-report-templates)
- [Books](#books) - [Books](#books)
- [Penetration Testing Books](#penetration-testing-books) - [Penetration Testing Books](#penetration-testing-books)
- [Hackers Handbook Series](#hackers-handbook-series) - [Hackers Handbook Series](#hackers-handbook-series)
@ -363,6 +364,14 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs. * [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.
* [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks. * [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
### Penetration Testing Report Templates
* [Public Pentesting Reports](https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups
* [Pentesting Report Template](https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - testandverification.com template
* [Pentesting Report Template](https://www.hitachi-systems-security.com/wp-content/uploads/Above-Security-Technical-Security-Audit-Demo-Report_En_FINAL.pdf) - hitachi-systems-security.com template
* [Pentesting Report Template](http://lucideus.com/pdf/stw.pdf) - lucideus.com template
* [Pentesting Report Template](https://www.crest-approved.org/wp-content/uploads/CREST-Penetration-Testing-Guide.pdf) - crest-approved.org templage
* [Pentesting Report Template](https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf) - pcisecuritystandards.org template
## Books ## Books
### Penetration Testing Books ### Penetration Testing Books
* [The Art of Exploitation by Jon Erickson, 2008](https://www.nostarch.com/hacking2.htm) * [The Art of Exploitation by Jon Erickson, 2008](https://www.nostarch.com/hacking2.htm)