Merge pull request #40 from paulblei/master

Updated structure & Added Rasp category , thank @paulblei
This commit is contained in:
sbilly 2016-11-25 14:56:04 +08:00 committed by GitHub
commit 1e8c7a50a2

View File

@ -24,8 +24,16 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [Docker](#docker)
- [Endpoint](#endpoint)
- [Anti-Virus / Anti-Malware](#anti-virus--anti-malware)
- [Configuration Management](#configuration-management)
- [Authentication](#authentication)
- [Mobile / Android / iOS](#mobile--android--ios)
- [Forensics](#forensics)
- [Threat Intelligence](#threat-intelligence)
- [Web](#web)
- [Organization](#organization)
- [Web Application Firewall](#web-application-firewall)
- [Scanning / Pentesting](#scanning--pentesting-1)
- [Runtime Application Self-Protection](#runtime-application-self-protection)
- [Big Data](#big-data)
- [DevOps](#devops)
- [Other Awesome Lists](#other-awesome-lists)
@ -165,7 +173,7 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [google-authenticator](https://github.com/google/google-authenticator) - The Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms, as well as a pluggable authentication module (PAM). One-time passcodes are generated using open standards developed by the Initiative for Open Authentication (OATH) (which is unrelated to OAuth). These implementations support the HMAC-Based One-time Password (HOTP) algorithm specified in RFC 4226 and the Time-based One-time Password (TOTP) algorithm specified in RFC 6238. [Tutorials: How to set up two-factor authentication for SSH login on Linux](http://xmodulo.com/two-factor-authentication-ssh-login-linux.html)
### Mobile / Android /iOS
### Mobile / Android / iOS
- [android-security-awesome](https://github.com/ashishb/android-security-awesome) - A collection of android security related resources. A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.
- [SecMobi Wiki](http://wiki.secmobi.com/) - A collection of mobile security resources which including articles, blogs, books, groups, projects, tools and conferences. *
@ -214,6 +222,10 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [Recon-ng](https://bitbucket.org/LaNMaSteR53/recon-ng) - Recon-ng is a full-featured Web Reconnaissance framework written in Python. Recon-ng has a look and feel similar to the Metasploit Framework.
- [PTF](https://github.com/trustedsec/ptf) - The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
### Runtime Application Self-Protection
- [Sqreen](https://www.sqreen.io/) - Sqreen is a Runtime Application Self-Protection (RASP) solution for software teams. An in-app agent instruments and monitors the app. Suspicious user activities are reported and attacks are blocked at runtime without code modification or traffic redirection.
## Big Data
- [data_hacking](https://github.com/ClickSecurity/data_hacking) - Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data.