Update README.md

Add Network / Recon section and a few vulnerable app/OS resources.
This commit is contained in:
Brandon Stewart 2017-10-23 21:23:04 -06:00 committed by GitHub
parent 4cde2199f7
commit be36460f3e

View File

@ -22,6 +22,7 @@ We started a new [tools](https://github.com/vitalysim/Awesome-Hacking-Resources/
* [Sharpening Your Skills](#sharpening-your-skills) * [Sharpening Your Skills](#sharpening-your-skills)
* [Reverse Engineering, Buffer Overflow and Exploit Development](#reverse-engineering-buffer-overflow-and-exploit-development) * [Reverse Engineering, Buffer Overflow and Exploit Development](#reverse-engineering-buffer-overflow-and-exploit-development)
* [Privilege Escalation](#privilege-escalation) * [Privilege Escalation](#privilege-escalation)
* [Network Scanning / Reconnaissance](#network-Scanning-/-Reconnaissance)
* [Malware Analysis](#malware-analysis) * [Malware Analysis](#malware-analysis)
* [Vulnerable Web Application](#vulnerable-web-application) * [Vulnerable Web Application](#vulnerable-web-application)
* [Vulnerable OS](#vulnerable-os) * [Vulnerable OS](#vulnerable-os)
@ -190,6 +191,12 @@ Privilege Escalation
* [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623) * [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623)
* [4 Ways get linux privilege escalation](http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation/) * [4 Ways get linux privilege escalation](http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation/)
Network Scanning / Reconnaissance
--
* [NMAP](https://nmap.org/)
* [Foot Printing with WhoIS/DNS records](https://www.sans.org/reading-room/whitepapers/hackers/fundamentals-computer-hacking-956)
* [Google Dorks/Google Hacking] (https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc/)
Malware Analysis Malware Analysis
-- --
* [Malware traffic analysis](http://www.malware-traffic-analysis.net/) * [Malware traffic analysis](http://www.malware-traffic-analysis.net/)
@ -206,11 +213,14 @@ Vulnerable Web Application
* [OWASP Broken Web Applications Project](https://github.com/chuckfw/owaspbwa/) * [OWASP Broken Web Applications Project](https://github.com/chuckfw/owaspbwa/)
* [Damn Small Vulnerable Web](https://github.com/stamparm/DSVW) * [Damn Small Vulnerable Web](https://github.com/stamparm/DSVW)
* [OWASP Juice Shop](https://github.com/bkimminich/juice-shop) * [OWASP Juice Shop](https://github.com/bkimminich/juice-shop)
* [Google Gruyere](https://google-gruyere.appspot.com/)
Vulnerable OS Vulnerable OS
-- --
* [Metasploitable2 (Linux)](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/) * [Metasploitable2 (Linux)](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/)
* [Metasploitable3](https://github.com/rapid7/metasploitable3) \[[Installation](https://github.com/rapid7/metasploitable3/blob/master/README.md)\] * [Metasploitable3](https://github.com/rapid7/metasploitable3) \[[Installation](https://github.com/rapid7/metasploitable3/blob/master/README.md)\]
* [Vulnhub](https://www.vulnhub.com/)
* [General Test Environment Guidance](https://community.rapid7.com/docs/DOC-2196)
Linux Penetration Testing OS Linux Penetration Testing OS
-- --