Update README.md
parent
dde01ae375
commit
f6e65cf55a
|
@ -1,10 +1,10 @@
|
||||||
# Awesome Resources For Learning Ethical Hacking & Pentesting ![Awesome Hacking](https://img.shields.io/badge/awesome-hacking-red.svg) ![Awesome community](https://img.shields.io/badge/awesome-community-green.svg)
|
# Awesome Resources For Learning Ethical Hacking & Pentesting ⚡️ [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) ![Awesome Hacking](https://img.shields.io/badge/awesome-hacking-red.svg) ![Awesome community](https://img.shields.io/badge/awesome-community-green.svg)
|
||||||
|
|
||||||
What I’m sharing here is a collection of some best resources about Hacking & Penetration Testing to make you learn faster! Let's make it the best resource repository for our community.
|
What I’m sharing here is a collection of some best resources about Hacking & Penetration Testing to make you learn faster! Let's make it the best resource repository for our community.
|
||||||
|
|
||||||
**You are welcome to fork and contribute.**
|
**You are welcome to fork and contribute.**
|
||||||
|
|
||||||
**Also you can find my own writeups/tutorials on medium : @hussnainfareed :)**
|
**Also you can find my own writeups/tutorials on medium: @hussnainfareed :)**
|
||||||
|
|
||||||
|
|
||||||
## Books
|
## Books
|
||||||
|
@ -16,7 +16,7 @@ What I’m sharing here is a collection of some best resources about Hacking & P
|
||||||
5. Social Engineering: The Art of Human Hacking
|
5. Social Engineering: The Art of Human Hacking
|
||||||
6. Hacking: The Art of Exploitation, 2nd Edition
|
6. Hacking: The Art of Exploitation, 2nd Edition
|
||||||
7. Web Hacking 101
|
7. Web Hacking 101
|
||||||
8. OWASP Testing Guide (A must read for web application developers and penetration testers)
|
8. OWASP Testing Guide (A must-read for web application developers and penetration testers)
|
||||||
9. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
|
9. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
|
||||||
10. The Basics of Web Hacking: Tools and Techniques to Attack the Web
|
10. The Basics of Web Hacking: Tools and Techniques to Attack the Web
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue