From 7040fb8e1ac58c1a5831011e81ddd841ad0186da Mon Sep 17 00:00:00 2001 From: ch0ic3 Date: Tue, 17 Dec 2024 13:27:29 -0800 Subject: [PATCH] updated the MD --- README.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 0986e30..1d9c868 100644 --- a/README.md +++ b/README.md @@ -49,7 +49,7 @@ Web hacking focuses on exploiting vulnerabilities in web applications, websites, With the rise of smartphones and IoT devices, Android security has become a critical area of study. Understanding the Android ecosystem and common vulnerabilities can help you secure mobile applications and devices. ### **Resources** -- [Mobile Security](https://github.com/vaib25vicky/awesome-mobile-security) +- [Mobile Security](https://theredteam.tech/ch0ic3/awesome-mobile-security) --- @@ -69,7 +69,7 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve - **Static Analysis**: [PEStudio](https://www.winitor.com/), [Binwalk](https://github.com/ReFirmLabs/binwalk) #### **Essential Resources** -0. [Awesome malware analysis](https://theredteam.tech/ch0ic3/awesome-malware-analysis) +0. [Awesome malware analysis](https://theredteam.tech/ch0ic3/awesome-malware-analysis) - git list like this one but only with malware resources 1. [Malware Unicorn’s Training](https://malwareunicorn.org/#/workshops) - Excellent workshops and guides for malware analysis. 2. [Practical Malware Analysis Labs](http://practicalmalwareanalysis.com/labs/) - Hands-on exercises to practice analysis. 3. [Remnux](https://remnux.org/) - A Linux distribution specifically tailored for malware analysis. @@ -118,9 +118,9 @@ Social engineering exploits human psychology to gain unauthorized access or gath 4. Monitor for unusual activity, such as unauthorized login attempts. #### **Further Reading** -1. [Social Engineering: The Science of Human Hacking by Christopher Hadnagy](https://www.amazon.com/Social-Engineering-Science-Human-Hacking/dp/111943338X) +1. [Social Engineering: The Science of Human Hacking by Christopher Hadnagy MISSING]() 2. [Social Engineering Framework](https://www.social-engineer.org/framework/) - Comprehensive resource for understanding social engineering tactics. -3. [The Psychology of Information Security](https://www.amazon.com/Psychology-Information-Security-Liminal-Space/dp/0995743705) - Learn about human factors in cybersecurity. +3. [The Psychology of Information Security MISSING]() - Learn about human factors in cybersecurity. #### **Hands-On Activities** - Conduct phishing campaigns in a controlled environment using [Gophish](https://getgophish.com/). @@ -131,8 +131,8 @@ Social engineering exploits human psychology to gain unauthorized access or gath Reverse engineering involves analyzing software or hardware to understand its design and behavior. This skill is essential for malware analysis, vulnerability research, and exploit development. ### **Recommended Books** -1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical-Reverse-Engineering.pdf) -2. [The IDA Pro Book](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/The-IDA-Pro-Book.pdf) +1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf) +2. [The IDA Pro Book MISSING]() ---