Updated tools and Readme

This commit is contained in:
Vitaly 2017-10-28 19:57:54 +03:00
parent 3036ded0a3
commit 07e87edecc
2 changed files with 4 additions and 0 deletions

View File

@ -173,6 +173,7 @@ Sharpening Your Skills
* [Hacker test](http://www.hackertest.net/) * [Hacker test](http://www.hackertest.net/)
* [Crackmes.de Archive (2011-2015)](https://tuts4you.com/download.php?view.3152) * [Crackmes.de Archive (2011-2015)](https://tuts4you.com/download.php?view.3152)
* [ROP Emporium](https://ropemporium.com/) * [ROP Emporium](https://ropemporium.com/)
* [Google's XSS game](https://xss-game.appspot.com/)
Reverse Engineering, Buffer Overflow and Exploit Development Reverse Engineering, Buffer Overflow and Exploit Development
-- --
@ -197,6 +198,7 @@ Reverse Engineering, Buffer Overflow and Exploit Development
* [Lena's Reversing for Newbies (Complete)](https://tuts4you.com/download.php?view.2876) * [Lena's Reversing for Newbies (Complete)](https://tuts4you.com/download.php?view.2876)
* [Megabeets journey into Radare2](https://www.megabeets.net/a-journey-into-radare-2-part-1/) * [Megabeets journey into Radare2](https://www.megabeets.net/a-journey-into-radare-2-part-1/)
* [Introduction to ARM Assembly Basics] (https://azeria-labs.com/writing-arm-assembly-part-1/) * [Introduction to ARM Assembly Basics] (https://azeria-labs.com/writing-arm-assembly-part-1/)
* [Linux (x86) Exploit Development Series](https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/)
Privilege Escalation Privilege Escalation
-- --

View File

@ -59,11 +59,13 @@ Name | Description
---- | ---- ---- | ----
[SQLmap](http://sqlmap.org/) | Automatic SQL injection and database takeover tool [SQLmap](http://sqlmap.org/) | Automatic SQL injection and database takeover tool
[SQLninja](http://sqlninja.sourceforge.net/) | SQL Server injection & takeover tool [SQLninja](http://sqlninja.sourceforge.net/) | SQL Server injection & takeover tool
[SQLiv](https://github.com/Hadesy2k/sqliv) | Massive SQL injection scanner
### Post explotation ### Post explotation
Name | Description Name | Description
---- | ---- ---- | ----
[Portia](https://github.com/SpiderLabs/portia) | Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. [Portia](https://github.com/SpiderLabs/portia) | Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
[RSPET](https://github.com/panagiks/RSPET) | RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
### Search Engine for Penetration Tester ### Search Engine for Penetration Tester