updated the MD
This commit is contained in:
parent
ffadd85919
commit
7040fb8e1a
12
README.md
12
README.md
@ -49,7 +49,7 @@ Web hacking focuses on exploiting vulnerabilities in web applications, websites,
|
|||||||
With the rise of smartphones and IoT devices, Android security has become a critical area of study. Understanding the Android ecosystem and common vulnerabilities can help you secure mobile applications and devices.
|
With the rise of smartphones and IoT devices, Android security has become a critical area of study. Understanding the Android ecosystem and common vulnerabilities can help you secure mobile applications and devices.
|
||||||
|
|
||||||
### **Resources**
|
### **Resources**
|
||||||
- [Mobile Security](https://github.com/vaib25vicky/awesome-mobile-security)
|
- [Mobile Security](https://theredteam.tech/ch0ic3/awesome-mobile-security)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -69,7 +69,7 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve
|
|||||||
- **Static Analysis**: [PEStudio](https://www.winitor.com/), [Binwalk](https://github.com/ReFirmLabs/binwalk)
|
- **Static Analysis**: [PEStudio](https://www.winitor.com/), [Binwalk](https://github.com/ReFirmLabs/binwalk)
|
||||||
|
|
||||||
#### **Essential Resources**
|
#### **Essential Resources**
|
||||||
0. [Awesome malware analysis](https://theredteam.tech/ch0ic3/awesome-malware-analysis)
|
0. [Awesome malware analysis](https://theredteam.tech/ch0ic3/awesome-malware-analysis) - git list like this one but only with malware resources
|
||||||
1. [Malware Unicorn’s Training](https://malwareunicorn.org/#/workshops) - Excellent workshops and guides for malware analysis.
|
1. [Malware Unicorn’s Training](https://malwareunicorn.org/#/workshops) - Excellent workshops and guides for malware analysis.
|
||||||
2. [Practical Malware Analysis Labs](http://practicalmalwareanalysis.com/labs/) - Hands-on exercises to practice analysis.
|
2. [Practical Malware Analysis Labs](http://practicalmalwareanalysis.com/labs/) - Hands-on exercises to practice analysis.
|
||||||
3. [Remnux](https://remnux.org/) - A Linux distribution specifically tailored for malware analysis.
|
3. [Remnux](https://remnux.org/) - A Linux distribution specifically tailored for malware analysis.
|
||||||
@ -118,9 +118,9 @@ Social engineering exploits human psychology to gain unauthorized access or gath
|
|||||||
4. Monitor for unusual activity, such as unauthorized login attempts.
|
4. Monitor for unusual activity, such as unauthorized login attempts.
|
||||||
|
|
||||||
#### **Further Reading**
|
#### **Further Reading**
|
||||||
1. [Social Engineering: The Science of Human Hacking by Christopher Hadnagy](https://www.amazon.com/Social-Engineering-Science-Human-Hacking/dp/111943338X)
|
1. [Social Engineering: The Science of Human Hacking by Christopher Hadnagy MISSING]()
|
||||||
2. [Social Engineering Framework](https://www.social-engineer.org/framework/) - Comprehensive resource for understanding social engineering tactics.
|
2. [Social Engineering Framework](https://www.social-engineer.org/framework/) - Comprehensive resource for understanding social engineering tactics.
|
||||||
3. [The Psychology of Information Security](https://www.amazon.com/Psychology-Information-Security-Liminal-Space/dp/0995743705) - Learn about human factors in cybersecurity.
|
3. [The Psychology of Information Security MISSING]() - Learn about human factors in cybersecurity.
|
||||||
|
|
||||||
#### **Hands-On Activities**
|
#### **Hands-On Activities**
|
||||||
- Conduct phishing campaigns in a controlled environment using [Gophish](https://getgophish.com/).
|
- Conduct phishing campaigns in a controlled environment using [Gophish](https://getgophish.com/).
|
||||||
@ -131,8 +131,8 @@ Social engineering exploits human psychology to gain unauthorized access or gath
|
|||||||
Reverse engineering involves analyzing software or hardware to understand its design and behavior. This skill is essential for malware analysis, vulnerability research, and exploit development.
|
Reverse engineering involves analyzing software or hardware to understand its design and behavior. This skill is essential for malware analysis, vulnerability research, and exploit development.
|
||||||
|
|
||||||
### **Recommended Books**
|
### **Recommended Books**
|
||||||
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical-Reverse-Engineering.pdf)
|
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf)
|
||||||
2. [The IDA Pro Book](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/The-IDA-Pro-Book.pdf)
|
2. [The IDA Pro Book MISSING]()
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user