mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-23 06:09:22 -05:00
Fix spaces
This commit is contained in:
parent
0c5e3f3a7b
commit
f2fb9526bd
@ -7,6 +7,7 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
|
|||||||
## Resources
|
## Resources
|
||||||
### Penetration Testing
|
### Penetration Testing
|
||||||
* [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course.
|
* [Metasploit Unleashed](http://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security metasploit course.
|
||||||
|
|
||||||
### Social Engineering
|
### Social Engineering
|
||||||
* [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers.
|
* [Social Engineering Framework](http://www.social-engineer.org/framework/) - An information resource for social engineers.
|
||||||
|
|
||||||
@ -15,15 +16,20 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
|
|||||||
### Penetration Testing
|
### Penetration Testing
|
||||||
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
|
* [Kali](http://www.kali.org/) - A Linux distribution designed for digital forensics and penetration testing.
|
||||||
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
|
* [Metasploit](http://www.metasploit.com/) - World's most used penetration testing software.
|
||||||
|
|
||||||
### Social Engineering
|
### Social Engineering
|
||||||
* [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec
|
* [SET](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit from TrustedSec
|
||||||
|
|
||||||
### Anonimity
|
### Anonimity
|
||||||
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity.
|
* [Tor](https://www.torproject.org/) - The free software for enabling onion routing online anonymity.
|
||||||
* [I2P](https://geti2p.net) - The Invisible Internet Project
|
* [I2P](https://geti2p.net) - The Invisible Internet Project
|
||||||
|
|
||||||
### Networks tools
|
### Networks tools
|
||||||
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc.
|
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc.
|
||||||
|
|
||||||
### Hex editors
|
### Hex editors
|
||||||
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing.
|
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing.
|
||||||
|
|
||||||
### Windows utils
|
### Windows utils
|
||||||
* [Sysinternals Suite](http://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities
|
* [Sysinternals Suite](http://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities
|
||||||
|
|
||||||
@ -54,8 +60,10 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
|
|||||||
* [The Art of Exploitation by Jon Erickson, 2008](http://www.nostarch.com/hacking2.htm)
|
* [The Art of Exploitation by Jon Erickson, 2008](http://www.nostarch.com/hacking2.htm)
|
||||||
* [Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011](http://www.nostarch.com/metasploit)
|
* [Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011](http://www.nostarch.com/metasploit)
|
||||||
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting)
|
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](http://www.nostarch.com/pentesting)
|
||||||
|
|
||||||
### Windows
|
### Windows
|
||||||
* [Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu](http://technet.microsoft.com/en-us/sysinternals/bb963901.aspx)
|
* [Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu](http://technet.microsoft.com/en-us/sysinternals/bb963901.aspx)
|
||||||
|
|
||||||
### Social Engineering
|
### Social Engineering
|
||||||
* [The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002](http://wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
|
* [The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002](http://wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
|
||||||
* [The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005](http://wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
|
* [The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005](http://wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
|
||||||
|
Loading…
Reference in New Issue
Block a user