mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 10:56:12 +00:00
Update README.md
Add Network / Recon section and a few vulnerable app/OS resources.
This commit is contained in:
parent
4cde2199f7
commit
be36460f3e
10
README.md
10
README.md
@ -22,6 +22,7 @@ We started a new [tools](https://github.com/vitalysim/Awesome-Hacking-Resources/
|
||||
* [Sharpening Your Skills](#sharpening-your-skills)
|
||||
* [Reverse Engineering, Buffer Overflow and Exploit Development](#reverse-engineering-buffer-overflow-and-exploit-development)
|
||||
* [Privilege Escalation](#privilege-escalation)
|
||||
* [Network Scanning / Reconnaissance](#network-Scanning-/-Reconnaissance)
|
||||
* [Malware Analysis](#malware-analysis)
|
||||
* [Vulnerable Web Application](#vulnerable-web-application)
|
||||
* [Vulnerable OS](#vulnerable-os)
|
||||
@ -190,6 +191,12 @@ Privilege Escalation
|
||||
* [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623)
|
||||
* [4 Ways get linux privilege escalation](http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation/)
|
||||
|
||||
Network Scanning / Reconnaissance
|
||||
--
|
||||
* [NMAP](https://nmap.org/)
|
||||
* [Foot Printing with WhoIS/DNS records](https://www.sans.org/reading-room/whitepapers/hackers/fundamentals-computer-hacking-956)
|
||||
* [Google Dorks/Google Hacking] (https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc/)
|
||||
|
||||
Malware Analysis
|
||||
--
|
||||
* [Malware traffic analysis](http://www.malware-traffic-analysis.net/)
|
||||
@ -206,11 +213,14 @@ Vulnerable Web Application
|
||||
* [OWASP Broken Web Applications Project](https://github.com/chuckfw/owaspbwa/)
|
||||
* [Damn Small Vulnerable Web](https://github.com/stamparm/DSVW)
|
||||
* [OWASP Juice Shop](https://github.com/bkimminich/juice-shop)
|
||||
* [Google Gruyere](https://google-gruyere.appspot.com/)
|
||||
|
||||
Vulnerable OS
|
||||
--
|
||||
* [Metasploitable2 (Linux)](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/)
|
||||
* [Metasploitable3](https://github.com/rapid7/metasploitable3) \[[Installation](https://github.com/rapid7/metasploitable3/blob/master/README.md)\]
|
||||
* [Vulnhub](https://www.vulnhub.com/)
|
||||
* [General Test Environment Guidance](https://community.rapid7.com/docs/DOC-2196)
|
||||
|
||||
Linux Penetration Testing OS
|
||||
--
|
||||
|
Loading…
Reference in New Issue
Block a user