Reorderd. Added Forums and Vulnerable Web Application

sections. Added new RE resources.
pull/5/head
Vitaly 2017-10-13 21:50:23 +03:00
parent f1d8d082f7
commit 29bad82c47
1 changed files with 25 additions and 5 deletions

View File

@ -44,10 +44,6 @@ YouTube channels
* [Waleed Jutt](https://www.youtube.com/channel/UCeN7cOELsyMHrzfMsJUgv3Q) * [Waleed Jutt](https://www.youtube.com/channel/UCeN7cOELsyMHrzfMsJUgv3Q)
* [webpwnized](https://www.youtube.com/channel/UCPeJcqbi8v46Adk59plaaXg) * [webpwnized](https://www.youtube.com/channel/UCPeJcqbi8v46Adk59plaaXg)
Archived Security Conference Videos
--
* [InfoCon.org](https://infocon.org/cons/)
Sharpening Your Skills Sharpening Your Skills
-- --
* [OWASP Security Shepherd](https://security-shepherd.ctf365.com/login.jsp) * [OWASP Security Shepherd](https://security-shepherd.ctf365.com/login.jsp)
@ -73,7 +69,8 @@ Reverse Engineering, Buffer overflow and Exploit development
-- --
* [Shell storm](http://shell-storm.org/) * [Shell storm](http://shell-storm.org/)
* [Buffer Overflow Exploitation Megaprimer for Linux](http://www.securitytube.net/groups?operation=view&groupId=4) * [Buffer Overflow Exploitation Megaprimer for Linux](http://www.securitytube.net/groups?operation=view&groupId=4)
* [Malware Unicorn](https://securedorg.github.io/RE101/) * [Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
* [Reverse Engineering Malware 102](https://securedorg.github.io/RE102/)
* [Modern Binary Exploitation - CSCI 4968](https://github.com/RPISEC/MBE) * [Modern Binary Exploitation - CSCI 4968](https://github.com/RPISEC/MBE)
* [Introductory Intel x86](http://www.opensecuritytraining.info/IntroX86.html) * [Introductory Intel x86](http://www.opensecuritytraining.info/IntroX86.html)
* [Binary hacking](http://liveoverflow.com/binary_hacking/index.html) * [Binary hacking](http://liveoverflow.com/binary_hacking/index.html)
@ -83,6 +80,7 @@ Reverse Engineering, Buffer overflow and Exploit development
* [Exploit development](https://0x00sec.org/c/exploit-development) * [Exploit development](https://0x00sec.org/c/exploit-development)
* [Corelan tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) * [Corelan tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
* [Reverse engineering reading list](https://github.com/onethawt/reverseengineering-reading-list/blob/master/README.md) * [Reverse engineering reading list](https://github.com/onethawt/reverseengineering-reading-list/blob/master/README.md)
* [Reverse Engineering challenges](https://challenges.re/)
Privileged escalation Privileged escalation
-- --
@ -107,6 +105,28 @@ Malware analysis
* [Malware traffic analysis](http://www.malware-traffic-analysis.net/) * [Malware traffic analysis](http://www.malware-traffic-analysis.net/)
* [Malware Analysis - CSCI 4976](https://github.com/RPISEC/Malware/blob/master/README.md) * [Malware Analysis - CSCI 4976](https://github.com/RPISEC/Malware/blob/master/README.md)
Vulnerable Web Application
--
* [OWASP Hackademic Challenges project](https://github.com/Hackademic/hackademic/)
* [bWAPP](http://www.itsecgames.com/)
* [Damn Vulnerable Web Application (DVWA)](http://www.dvwa.co.uk/)
* [Xtreme Vulnerable Web Application (XVWA)](https://github.com/s4n7h0/xvwa)
* [WebGoat: A deliberately insecure Web Application](https://github.com/WebGoat/WebGoat)
* [OWASP Mutillidae II](https://sourceforge.net/projects/mutillidae/files/)
* [OWASP Juice Shop](https://github.com/bkimminich/juice-shop)
* [OWASP Broken Web Applications Project](https://github.com/chuckfw/owaspbwa/)
Forums
--
* [Greysec](https://greysec.net)
* [Hackforums](https://hackforums.net/)
* [0x00sec](https://0x00sec.org/)
Archived Security Conference Videos
--
* [InfoCon.org](https://infocon.org/cons/)
Online Communities Online Communities
-- --
* [Hack+](http://t.me/hacking_group_channel) * [Hack+](http://t.me/hacking_group_channel)