Update section headers

This commit is contained in:
pe3zx 2019-10-12 15:56:33 +07:00
parent 458d991849
commit 6b793c71fd

View File

@ -20,7 +20,7 @@ This repository is created as an online bookmark for useful links, resources and
- [Open-source Intelligence (OSINT)](#open-source-intelligence-osint) - [Open-source Intelligence (OSINT)](#open-source-intelligence-osint)
- [Password Cracking and Wordlists](#password-cracking-and-wordlists) - [Password Cracking and Wordlists](#password-cracking-and-wordlists)
- [Post Exploitation](#post-exploitation) - [Post Exploitation](#post-exploitation)
- [Social Engineering and OSINT](#social-engineering-and-osint) - [Social Engineering](#social-engineering)
- [Vulnerable](#vulnerable) - [Vulnerable](#vulnerable)
- [Web Application Security](#web-application-security) - [Web Application Security](#web-application-security)
@ -382,6 +382,10 @@ This repository is created as an online bookmark for useful links, resources and
## Cryptography ## Cryptography
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/CERTCC/keyfinder">CERTCC/keyfinder</a></td> <td><a href="https://github.com/CERTCC/keyfinder">CERTCC/keyfinder</a></td>
<td>A tool for analyzing private (and public) key files, including support for Android APK files.</td> <td>A tool for analyzing private (and public) key files, including support for Android APK files.</td>
@ -415,6 +419,10 @@ This repository is created as an online bookmark for useful links, resources and
## Data Exfiltration ## Data Exfiltration
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/evilsocket/sg1">evilsocket/sg1</a></td> <td><a href="https://github.com/evilsocket/sg1">evilsocket/sg1</a></td>
<td>A wanna be swiss army knife for data encryption, exfiltration and covert communication.</td> <td>A wanna be swiss army knife for data encryption, exfiltration and covert communication.</td>
@ -436,6 +444,10 @@ This repository is created as an online bookmark for useful links, resources and
## Data Sets ## Data Sets
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://www.splunk.com/blog/2018/05/10/boss-of-the-soc-scoring-server-questions-and-answers-and-dataset-open-sourced-and-ready-for-download.html">BOTS 1.0 Dataset</a></td> <td><a href="https://www.splunk.com/blog/2018/05/10/boss-of-the-soc-scoring-server-questions-and-answers-and-dataset-open-sourced-and-ready-for-download.html">BOTS 1.0 Dataset</a></td>
<td>The BOTS 1.0 dataset records two attacks perpetrated by a fictitious hacktivist group called po1s0n1vy targeting Wayne Corp of Batman mythology. There are many comic book references in the data; from heroes and villains to “Batmans” street addresses. Not only does the dataset have many different types of data—everything from Sysmon to Suricata—but there are even file hashes that can be found in Virustotal.com and domains/IPs to hunt for in OSINT tools like PassiveTotal and Robtex!</td> <td>The BOTS 1.0 dataset records two attacks perpetrated by a fictitious hacktivist group called po1s0n1vy targeting Wayne Corp of Batman mythology. There are many comic book references in the data; from heroes and villains to “Batmans” street addresses. Not only does the dataset have many different types of data—everything from Sysmon to Suricata—but there are even file hashes that can be found in Virustotal.com and domains/IPs to hunt for in OSINT tools like PassiveTotal and Robtex!</td>
@ -453,6 +465,10 @@ This repository is created as an online bookmark for useful links, resources and
## Digital Forensics and Incident Response ## Digital Forensics and Incident Response
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://www.flashbackdata.com/free-forensics-tool-i-file-parser/">$I File Parser</a></td> <td><a href="https://www.flashbackdata.com/free-forensics-tool-i-file-parser/">$I File Parser</a></td>
<td>Free Forensics Tool $I File Parser</td> <td>Free Forensics Tool $I File Parser</td>
@ -750,6 +766,10 @@ This repository is created as an online bookmark for useful links, resources and
## Exploits ## Exploits
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/externalist/exploit_playground">externalist/exploit_playground</a></td> <td><a href="https://github.com/externalist/exploit_playground">externalist/exploit_playground</a></td>
<td>Analysis of public exploits or my 1day exploits</td> <td>Analysis of public exploits or my 1day exploits</td>
@ -819,6 +839,10 @@ This repository is created as an online bookmark for useful links, resources and
## Hardening ## Hardening
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://public.cyber.mil/stigs/">Security Technical Implementation Guides (STIGs)</a></td> <td><a href="https://public.cyber.mil/stigs/">Security Technical Implementation Guides (STIGs)</a></td>
<td>The Security Technical Implementation Guides (STIGs) are the configuration standards for DOD IA and IA-enabled devices/systems.</td> <td>The Security Technical Implementation Guides (STIGs) are the configuration standards for DOD IA and IA-enabled devices/systems.</td>
@ -836,6 +860,10 @@ This repository is created as an online bookmark for useful links, resources and
## Hardware ## Hardware
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/ufrisk/pcileech">ufrisk/pcileech</a></td> <td><a href="https://github.com/ufrisk/pcileech">ufrisk/pcileech</a></td>
<td>Direct Memory Access (DMA) Attack Software</td> <td>Direct Memory Access (DMA) Attack Software</td>
@ -845,6 +873,10 @@ This repository is created as an online bookmark for useful links, resources and
## Malware Analysis ## Malware Analysis
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/activecm/rita">activecm/rita</a></td> <td><a href="https://github.com/activecm/rita">activecm/rita</a></td>
<td> Real Intelligence Threat Analytics</td> <td> Real Intelligence Threat Analytics</td>
@ -1186,6 +1218,10 @@ This repository is created as an online bookmark for useful links, resources and
## Mobile Security ## Mobile Security
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/ac-pm/Inspeckage">ac-pm/Inspeckage</a></td> <td><a href="https://github.com/ac-pm/Inspeckage">ac-pm/Inspeckage</a></td>
<td>Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)</td> <td>Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)</td>
@ -1283,6 +1319,10 @@ This repository is created as an online bookmark for useful links, resources and
## Network Security ## Network Security
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/aol/moloch">aol/moloch</a></td> <td><a href="https://github.com/aol/moloch">aol/moloch</a></td>
<td>Moloch is an open source, large scale, full packet capturing, indexing, and database system</td> <td>Moloch is an open source, large scale, full packet capturing, indexing, and database system</td>
@ -1336,6 +1376,10 @@ This repository is created as an online bookmark for useful links, resources and
## Open-source Intelligence (OSINT) ## Open-source Intelligence (OSINT)
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://inteltechniques.com/menu.html">Buscador</a></td> <td><a href="https://inteltechniques.com/menu.html">Buscador</a></td>
<td>Buscador is an OSINT Linux Virtual Machine that is pre-configured for online investigations</td> <td>Buscador is an OSINT Linux Virtual Machine that is pre-configured for online investigations</td>
@ -1604,9 +1648,13 @@ This repository is created as an online bookmark for useful links, resources and
</tr> </tr>
</table> </table>
## Social Engineering and OSINT ## Social Engineering
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/boxug/trape">boxug/trape</a></td> <td><a href="https://github.com/boxug/trape">boxug/trape</a></td>
<td>People tracker on the Internet: Learn to track the world, to avoid being traced.</td> <td>People tracker on the Internet: Learn to track the world, to avoid being traced.</td>
@ -1688,6 +1736,10 @@ This repository is created as an online bookmark for useful links, resources and
## Vulnerable ## Vulnerable
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/appsecco/VyAPI">appsecco/VyAPI</a></td> <td><a href="https://github.com/appsecco/VyAPI">appsecco/VyAPI</a></td>
<td>VyAPI - A cloud based vulnerable hybrid Android App</a></td> <td>VyAPI - A cloud based vulnerable hybrid Android App</a></td>
@ -1753,6 +1805,10 @@ This repository is created as an online bookmark for useful links, resources and
## Web Application Security ## Web Application Security
<table> <table>
<tr>
<td><b>Link</b></td>
<td><b>Description</b></td>
</tr>
<tr> <tr>
<td><a href="https://github.com/ambionics/phpggc">ambionics/phpggc</a></td> <td><a href="https://github.com/ambionics/phpggc">ambionics/phpggc</a></td>
<td>PHPGGC is a library of unserialize() payloads along with a tool to generate them, from command line or programmatically.</td> <td>PHPGGC is a library of unserialize() payloads along with a tool to generate them, from command line or programmatically.</td>