mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-10-01 11:45:36 +00:00
Add missing section break lines
This commit is contained in:
parent
98b6087ca9
commit
e6d7854771
16
README.md
16
README.md
@ -359,6 +359,8 @@ My curated list of awesome links, resources and tools
|
|||||||
- [KVA Shadow: Mitigating Meltdown on Windows](https://blogs.technet.microsoft.com/srd/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/)
|
- [KVA Shadow: Mitigating Meltdown on Windows](https://blogs.technet.microsoft.com/srd/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/)
|
||||||
- [Total Meltdown?](https://blog.frizk.net/2018/03/total-meltdown.html)
|
- [Total Meltdown?](https://blog.frizk.net/2018/03/total-meltdown.html)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Malware Analysis
|
### Malware Analysis
|
||||||
|
|
||||||
*Malware analysis articles, techniques and examples*
|
*Malware analysis articles, techniques and examples*
|
||||||
@ -434,6 +436,8 @@ My curated list of awesome links, resources and tools
|
|||||||
- [Reverse engineering malware: TrickBot (part 2 - loader)](https://qmemcpy.github.io/post/reverse-engineering-malware-trickbot-part-2-loader)
|
- [Reverse engineering malware: TrickBot (part 2 - loader)](https://qmemcpy.github.io/post/reverse-engineering-malware-trickbot-part-2-loader)
|
||||||
- [Reverse engineering malware: TrickBot (part 3 - core)](https://qmemcpy.io/post/reverse-engineering-malware-trickbot-part-3-core)
|
- [Reverse engineering malware: TrickBot (part 3 - core)](https://qmemcpy.io/post/reverse-engineering-malware-trickbot-part-3-core)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Mobile Security
|
### Mobile Security
|
||||||
|
|
||||||
*Mobile security articles*
|
*Mobile security articles*
|
||||||
@ -442,6 +446,8 @@ My curated list of awesome links, resources and tools
|
|||||||
- [Mobile Application Hacking Diary Ep.2](https://www.exploit-db.com/papers/44145/)
|
- [Mobile Application Hacking Diary Ep.2](https://www.exploit-db.com/papers/44145/)
|
||||||
- [tanprathan/MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet)
|
- [tanprathan/MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Post Exploitation
|
### Post Exploitation
|
||||||
|
|
||||||
*Art of post exploitation techniques*
|
*Art of post exploitation techniques*
|
||||||
@ -451,6 +457,8 @@ My curated list of awesome links, resources and tools
|
|||||||
- [Post Exploitation Using NetNTLM Downgrade Attacks](https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks)
|
- [Post Exploitation Using NetNTLM Downgrade Attacks](https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks)
|
||||||
- [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa)
|
- [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Privacy
|
### Privacy
|
||||||
|
|
||||||
*Privacy and internet security guidelines for cyber activists*
|
*Privacy and internet security guidelines for cyber activists*
|
||||||
@ -459,6 +467,8 @@ My curated list of awesome links, resources and tools
|
|||||||
- [Protecting Your Source When Releasing Sensitive Documents](https://source.opennews.org/articles/how-protect-your-sources-when-releasing-sensitive-/)
|
- [Protecting Your Source When Releasing Sensitive Documents](https://source.opennews.org/articles/how-protect-your-sources-when-releasing-sensitive-/)
|
||||||
- [Security Education Companion](https://sec.eff.org/)
|
- [Security Education Companion](https://sec.eff.org/)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Reverse Engineering
|
### Reverse Engineering
|
||||||
|
|
||||||
*Reverse engineering tutorials and primers*
|
*Reverse engineering tutorials and primers*
|
||||||
@ -469,6 +479,8 @@ My curated list of awesome links, resources and tools
|
|||||||
- [How to decompile any Python binary](https://countercept.com/our-thinking/how-to-decompile-any-python-binary/)
|
- [How to decompile any Python binary](https://countercept.com/our-thinking/how-to-decompile-any-python-binary/)
|
||||||
- [Reverse Engineering 101](https://osandamalith.com/2014/12/31/reverse-engineering-101/)
|
- [Reverse Engineering 101](https://osandamalith.com/2014/12/31/reverse-engineering-101/)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Tutorials
|
### Tutorials
|
||||||
|
|
||||||
*This section contains links about tool tutorials, cheat sheet and techniques.*
|
*This section contains links about tool tutorials, cheat sheet and techniques.*
|
||||||
@ -661,6 +673,8 @@ My curated list of awesome links, resources and tools
|
|||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
## Web Application Security
|
## Web Application Security
|
||||||
|
|
||||||
*Web application security related articles and tutorials*
|
*Web application security related articles and tutorials*
|
||||||
@ -688,6 +702,8 @@ My curated list of awesome links, resources and tools
|
|||||||
- [NetSPI SQL Injection Wiki](https://sqlwiki.netspi.com/)
|
- [NetSPI SQL Injection Wiki](https://sqlwiki.netspi.com/)
|
||||||
- [Your Pokemon Guide for Essential SQL Pen Test Commands](https://pen-testing.sans.org/blog/2017/12/09/your-pokemon-guide-for-essential-sql-pen-test-commands)
|
- [Your Pokemon Guide for Essential SQL Pen Test Commands](https://pen-testing.sans.org/blog/2017/12/09/your-pokemon-guide-for-essential-sql-pen-test-commands)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
## Tools
|
## Tools
|
||||||
|
|
||||||
### AWS Security
|
### AWS Security
|
||||||
|
Loading…
Reference in New Issue
Block a user