mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-10-01 11:45:36 +00:00
Add section descriptions
This commit is contained in:
parent
58d05236e0
commit
98b6087ca9
10
README.md
10
README.md
@ -361,6 +361,8 @@ My curated list of awesome links, resources and tools
|
|||||||
|
|
||||||
### Malware Analysis
|
### Malware Analysis
|
||||||
|
|
||||||
|
*Malware analysis articles, techniques and examples*
|
||||||
|
|
||||||
![Process Injection Info Graphic by struppigel](https://4.bp.blogspot.com/-ixv5E0LMZCw/WWi5yRjL-_I/AAAAAAAAAnk/WO99S4Yrd8w6lfg6tITwUV02CGDFYAORACLcBGAs/s640/Process%2BInjection%25281%2529.png)
|
![Process Injection Info Graphic by struppigel](https://4.bp.blogspot.com/-ixv5E0LMZCw/WWi5yRjL-_I/AAAAAAAAAnk/WO99S4Yrd8w6lfg6tITwUV02CGDFYAORACLcBGAs/s640/Process%2BInjection%25281%2529.png)
|
||||||
|
|
||||||
- [A zebra in sheep’s clothing: How a Microsoft icon-display bug in Windows allows attackers to masquerade PE files with special icons](https://www.cybereason.com/labs-a-zebra-in-sheeps-clothing-how-a-microsoft-icon-display-bug-in-windows-allows-attackers-to-masquerade-pe-files-with-special-icons/)
|
- [A zebra in sheep’s clothing: How a Microsoft icon-display bug in Windows allows attackers to masquerade PE files with special icons](https://www.cybereason.com/labs-a-zebra-in-sheeps-clothing-how-a-microsoft-icon-display-bug-in-windows-allows-attackers-to-masquerade-pe-files-with-special-icons/)
|
||||||
@ -434,12 +436,16 @@ My curated list of awesome links, resources and tools
|
|||||||
|
|
||||||
### Mobile Security
|
### Mobile Security
|
||||||
|
|
||||||
|
*Mobile security articles*
|
||||||
|
|
||||||
- [Mobile Application Hacking Diary Ep.1](https://www.exploit-db.com/papers/26620/)
|
- [Mobile Application Hacking Diary Ep.1](https://www.exploit-db.com/papers/26620/)
|
||||||
- [Mobile Application Hacking Diary Ep.2](https://www.exploit-db.com/papers/44145/)
|
- [Mobile Application Hacking Diary Ep.2](https://www.exploit-db.com/papers/44145/)
|
||||||
- [tanprathan/MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet)
|
- [tanprathan/MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet)
|
||||||
|
|
||||||
### Post Exploitation
|
### Post Exploitation
|
||||||
|
|
||||||
|
*Art of post exploitation techniques*
|
||||||
|
|
||||||
#### Windows Post Exploitation
|
#### Windows Post Exploitation
|
||||||
|
|
||||||
- [Post Exploitation Using NetNTLM Downgrade Attacks](https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks)
|
- [Post Exploitation Using NetNTLM Downgrade Attacks](https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks)
|
||||||
@ -447,12 +453,16 @@ My curated list of awesome links, resources and tools
|
|||||||
|
|
||||||
### Privacy
|
### Privacy
|
||||||
|
|
||||||
|
*Privacy and internet security guidelines for cyber activists*
|
||||||
|
|
||||||
- [The Field Guide to Security Training in the Newsroom](https://the-field-guide-to-security-training-in-the-newsroom.readthedocs.io/en/latest/)
|
- [The Field Guide to Security Training in the Newsroom](https://the-field-guide-to-security-training-in-the-newsroom.readthedocs.io/en/latest/)
|
||||||
- [Protecting Your Source When Releasing Sensitive Documents](https://source.opennews.org/articles/how-protect-your-sources-when-releasing-sensitive-/)
|
- [Protecting Your Source When Releasing Sensitive Documents](https://source.opennews.org/articles/how-protect-your-sources-when-releasing-sensitive-/)
|
||||||
- [Security Education Companion](https://sec.eff.org/)
|
- [Security Education Companion](https://sec.eff.org/)
|
||||||
|
|
||||||
### Reverse Engineering
|
### Reverse Engineering
|
||||||
|
|
||||||
|
*Reverse engineering tutorials and primers*
|
||||||
|
|
||||||
- [A Gentle Primer on Reverse Engineering](https://emily.st/2015/01/27/reverse-engineering/)
|
- [A Gentle Primer on Reverse Engineering](https://emily.st/2015/01/27/reverse-engineering/)
|
||||||
- [ELF hacking with Rekall](http://blog.rekall-forensic.com/2018/01/elf-hacking-with-rekall.html)
|
- [ELF hacking with Rekall](http://blog.rekall-forensic.com/2018/01/elf-hacking-with-rekall.html)
|
||||||
- [FAQ: How to learn reverse-engineering?](http://gynvael.coldwind.pl/?id=664)
|
- [FAQ: How to learn reverse-engineering?](http://gynvael.coldwind.pl/?id=664)
|
||||||
|
Loading…
Reference in New Issue
Block a user