From bea85acd501b85f92e7d4adc15d13eb79dc614a9 Mon Sep 17 00:00:00 2001 From: Alec Nunn Date: Fri, 20 Oct 2017 15:05:33 -0700 Subject: [PATCH] Added Lena's tutorials and a few tools such as BinNavi --- README.md | 2 ++ contributing.md | 1 + tools.md | 15 ++++++++++----- 3 files changed, 13 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 6149f6d..1fbec46 100644 --- a/README.md +++ b/README.md @@ -110,6 +110,7 @@ Sharpening Your Skills * [Challenge Land](http://challengeland.co/) * [Participating Challenge Sites](http://www.wechall.net/active_sites/all/by/site_avg/DESC/page-1) * [Hacker test](http://www.hackertest.net/) +* [Crackmes.de Archive (2011-2015)](https://tuts4you.com/download.php?view.3152) Reverse Engineering, Buffer Overflow and Exploit Development -- @@ -131,6 +132,7 @@ Reverse Engineering, Buffer Overflow and Exploit Development * [reversing.kr challenges](http://www.reversing.kr/challenge.php) * [Analysis and exploitation (unprivileged)](https://www.it-sec-catalog.info/analysis_and_exploitation_unprivileged.html) * [A Course on Intermediate Level Linux Exploitation](https://github.com/nnamon/linux-exploitation-course) +* [Lena's Reversing for Newbies (Complete)](https://tuts4you.com/download.php?view.2876) Privilege Escalation -- diff --git a/contributing.md b/contributing.md index bedb4c3..17d9c6e 100644 --- a/contributing.md +++ b/contributing.md @@ -40,3 +40,4 @@ This resource was made by the developers and hackers alike! We appreciate and re * [Carlos Rincon](https://github.com/mezerotm) * [Christos Christoforidis](https://github.com/tsourtsouris) * [patMacMillan](https://github.com/patMacMillan) + * [Alec Nunn](https://github.com/alecnunn) \ No newline at end of file diff --git a/tools.md b/tools.md index 86dd84b..ea8bbfe 100644 --- a/tools.md +++ b/tools.md @@ -13,6 +13,7 @@ Repository | Description ### Awesome custom projects / Scripts Name | Description ---- | ---- +[mimikatz](https://github.com/gentilkiwi/mimikatz) | A useful tool to play with Windows security including extracting plaintext passwords, kerberos tickets, etc. ### Exploitation tools Name | Description @@ -55,20 +56,24 @@ Name | Description [Censys](https://www.censys.io/) | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time [Shodan](http://shodan.io/) | Shodan is the world's first search engine for Internet-connected devices. [Zoomeye](https://www.zoomeye.org/) | search engine for cyberspace that lets the user find specific network components(ip, services, etc.) -[Censys](https://www.censys.io/) | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time ### Awesome Repositories Repository | Description ---- | ---- -[Xerosploit](https://github.com/LionSec/xerosploit) | Efficient and advanced man in the middle framework -[SecLists](https://github.com/danielmiessler/SecLists) | It is a collection of multiple types of lists used during security assessments -[HUNT Proxy Extension](https://github.com/bugcrowd/HUNT) | Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite). [fuzzdb](https://github.com/fuzzdb-project/fuzzdb) | Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery. +[HUNT Proxy Extension](https://github.com/bugcrowd/HUNT) | Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite). +[SecLists](https://github.com/danielmiessler/SecLists) | It is a collection of multiple types of lists used during security assessments +[Xerosploit](https://github.com/LionSec/xerosploit) | Efficient and advanced man in the middle framework ### Source Code Analysis Tools Name | Description ---- | ---- +[pyup](https://pyup.io/) | Automated Security and Dependency Updates [RIPS](https://www.ripstech.com/) | PHP Security Analysis [Retire.js](http://retirejs.github.io/retire.js/) | detecting the use of JavaScript libraries with known vulnerabilities [Snyk](https://snyk.io/) | find & fix vulnerabilities in dependencies, supports various languages -[pyup](https://pyup.io/) | Automated Security and Dependency Updates + +### Binary Analysis Tools +Name | Description +---- | ---- +[BinNavi](https://github.com/google/binnavi) | BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code \ No newline at end of file