From abc097596010fd7d89731420e42b1cc2cb4be971 Mon Sep 17 00:00:00 2001 From: Vitaly simonovich Date: Tue, 10 Oct 2017 23:15:10 +0300 Subject: [PATCH] Update README.md --- README.md | 30 +++++++++++++++++++++++++++++- 1 file changed, 29 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index f1d9761..1063365 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ # Awesome-Hacking-Resources -A collection of hacking / penetration testing resources to make you a better! +A collection of hacking / penetration testing resources to make you better! You are welcome to fork and contribute @@ -19,3 +19,31 @@ Train your skills * [PentesterLab](https://pentesterlab.com/) * [SmashTheStack](http://smashthestack.org/wargames.html) * [Root-Me](https://www.root-me.org/) +* [PicoCTF](https://2017game.picoctf.com/) + +Reverse Engineering and Buffer overflow +-- +* [Shell storm](http://shell-storm.org/) +* [Buffer Overflow Exploitation Megaprimer for Linux](http://www.securitytube.net/groups?operation=view&groupId=4) +* [Malware Unicorn](https://securedorg.github.io/RE101/) +* [Modern Binary Exploitation - CSCI 4968](https://github.com/RPISEC/MBE) +* [Introductory Intel x86](http://www.opensecuritytraining.info/IntroX86.html) +* [Binary hacking](http://liveoverflow.com/binary_hacking/index.html) +* [Shellcode Injection](https://dhavalkapil.com/blogs/Shellcode-Injection/) + +Privileged escalation +-- +* [Reach the root](https://hackmag.com/security/reach-the-root/) +* [Basic linux privilege escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) +* [Windows Privilege Escalation](http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation) +* [Privilege escalation for Windows and Linux](https://github.com/AusJock/Privilege-Escalation) +* [Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html) +* [RootHelper](https://github.com/NullArray/RootHelper) +* [Windows exploits, mostly precompiled.](https://github.com/abatchy17/WindowsExploits) +* [Unix privesc checker](http://pentestmonkey.net/tools/audit/unix-privesc-check) +* [Privilege escalation linux with live example](http://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/) +* [Windows privilege escalation checker](https://github.com/netbiosX/Checklists/blob/master/Windows-Privilege-Escalation.md) +* [Linux Privilege Escalation Scripts](http://netsec.ws/?p=309#more-309) +* [AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation) +* [Linux Privilege Escalation Check Script](https://github.com/sleventyeleven/linuxprivchecker) +* [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623)