mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 10:56:12 +00:00
Added Lena's tutorials and a few tools such as BinNavi
This commit is contained in:
parent
823a2ff78e
commit
bea85acd50
@ -110,6 +110,7 @@ Sharpening Your Skills
|
|||||||
* [Challenge Land](http://challengeland.co/)
|
* [Challenge Land](http://challengeland.co/)
|
||||||
* [Participating Challenge Sites](http://www.wechall.net/active_sites/all/by/site_avg/DESC/page-1)
|
* [Participating Challenge Sites](http://www.wechall.net/active_sites/all/by/site_avg/DESC/page-1)
|
||||||
* [Hacker test](http://www.hackertest.net/)
|
* [Hacker test](http://www.hackertest.net/)
|
||||||
|
* [Crackmes.de Archive (2011-2015)](https://tuts4you.com/download.php?view.3152)
|
||||||
|
|
||||||
Reverse Engineering, Buffer Overflow and Exploit Development
|
Reverse Engineering, Buffer Overflow and Exploit Development
|
||||||
--
|
--
|
||||||
@ -131,6 +132,7 @@ Reverse Engineering, Buffer Overflow and Exploit Development
|
|||||||
* [reversing.kr challenges](http://www.reversing.kr/challenge.php)
|
* [reversing.kr challenges](http://www.reversing.kr/challenge.php)
|
||||||
* [Analysis and exploitation (unprivileged)](https://www.it-sec-catalog.info/analysis_and_exploitation_unprivileged.html)
|
* [Analysis and exploitation (unprivileged)](https://www.it-sec-catalog.info/analysis_and_exploitation_unprivileged.html)
|
||||||
* [A Course on Intermediate Level Linux Exploitation](https://github.com/nnamon/linux-exploitation-course)
|
* [A Course on Intermediate Level Linux Exploitation](https://github.com/nnamon/linux-exploitation-course)
|
||||||
|
* [Lena's Reversing for Newbies (Complete)](https://tuts4you.com/download.php?view.2876)
|
||||||
|
|
||||||
Privilege Escalation
|
Privilege Escalation
|
||||||
--
|
--
|
||||||
|
@ -40,3 +40,4 @@ This resource was made by the developers and hackers alike! We appreciate and re
|
|||||||
* [Carlos Rincon](https://github.com/mezerotm)
|
* [Carlos Rincon](https://github.com/mezerotm)
|
||||||
* [Christos Christoforidis](https://github.com/tsourtsouris)
|
* [Christos Christoforidis](https://github.com/tsourtsouris)
|
||||||
* [patMacMillan](https://github.com/patMacMillan)
|
* [patMacMillan](https://github.com/patMacMillan)
|
||||||
|
* [Alec Nunn](https://github.com/alecnunn)
|
15
tools.md
15
tools.md
@ -13,6 +13,7 @@ Repository | Description
|
|||||||
### Awesome custom projects / Scripts
|
### Awesome custom projects / Scripts
|
||||||
Name | Description
|
Name | Description
|
||||||
---- | ----
|
---- | ----
|
||||||
|
[mimikatz](https://github.com/gentilkiwi/mimikatz) | A useful tool to play with Windows security including extracting plaintext passwords, kerberos tickets, etc.
|
||||||
|
|
||||||
### Exploitation tools
|
### Exploitation tools
|
||||||
Name | Description
|
Name | Description
|
||||||
@ -55,20 +56,24 @@ Name | Description
|
|||||||
[Censys](https://www.censys.io/) | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time
|
[Censys](https://www.censys.io/) | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time
|
||||||
[Shodan](http://shodan.io/) | Shodan is the world's first search engine for Internet-connected devices.
|
[Shodan](http://shodan.io/) | Shodan is the world's first search engine for Internet-connected devices.
|
||||||
[Zoomeye](https://www.zoomeye.org/) | search engine for cyberspace that lets the user find specific network components(ip, services, etc.)
|
[Zoomeye](https://www.zoomeye.org/) | search engine for cyberspace that lets the user find specific network components(ip, services, etc.)
|
||||||
[Censys](https://www.censys.io/) | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time
|
|
||||||
|
|
||||||
### Awesome Repositories
|
### Awesome Repositories
|
||||||
Repository | Description
|
Repository | Description
|
||||||
---- | ----
|
---- | ----
|
||||||
[Xerosploit](https://github.com/LionSec/xerosploit) | Efficient and advanced man in the middle framework
|
|
||||||
[SecLists](https://github.com/danielmiessler/SecLists) | It is a collection of multiple types of lists used during security assessments
|
|
||||||
[HUNT Proxy Extension](https://github.com/bugcrowd/HUNT) | Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite).
|
|
||||||
[fuzzdb](https://github.com/fuzzdb-project/fuzzdb) | Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
|
[fuzzdb](https://github.com/fuzzdb-project/fuzzdb) | Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
|
||||||
|
[HUNT Proxy Extension](https://github.com/bugcrowd/HUNT) | Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite).
|
||||||
|
[SecLists](https://github.com/danielmiessler/SecLists) | It is a collection of multiple types of lists used during security assessments
|
||||||
|
[Xerosploit](https://github.com/LionSec/xerosploit) | Efficient and advanced man in the middle framework
|
||||||
|
|
||||||
### Source Code Analysis Tools
|
### Source Code Analysis Tools
|
||||||
Name | Description
|
Name | Description
|
||||||
---- | ----
|
---- | ----
|
||||||
|
[pyup](https://pyup.io/) | Automated Security and Dependency Updates
|
||||||
[RIPS](https://www.ripstech.com/) | PHP Security Analysis
|
[RIPS](https://www.ripstech.com/) | PHP Security Analysis
|
||||||
[Retire.js](http://retirejs.github.io/retire.js/) | detecting the use of JavaScript libraries with known vulnerabilities
|
[Retire.js](http://retirejs.github.io/retire.js/) | detecting the use of JavaScript libraries with known vulnerabilities
|
||||||
[Snyk](https://snyk.io/) | find & fix vulnerabilities in dependencies, supports various languages
|
[Snyk](https://snyk.io/) | find & fix vulnerabilities in dependencies, supports various languages
|
||||||
[pyup](https://pyup.io/) | Automated Security and Dependency Updates
|
|
||||||
|
### Binary Analysis Tools
|
||||||
|
Name | Description
|
||||||
|
---- | ----
|
||||||
|
[BinNavi](https://github.com/google/binnavi) | BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code
|
Loading…
Reference in New Issue
Block a user