updated the MD

This commit is contained in:
ch0ic3 2024-12-17 13:27:29 -08:00
parent ffadd85919
commit 7040fb8e1a

View File

@ -49,7 +49,7 @@ Web hacking focuses on exploiting vulnerabilities in web applications, websites,
With the rise of smartphones and IoT devices, Android security has become a critical area of study. Understanding the Android ecosystem and common vulnerabilities can help you secure mobile applications and devices.
### **Resources**
- [Mobile Security](https://github.com/vaib25vicky/awesome-mobile-security)
- [Mobile Security](https://theredteam.tech/ch0ic3/awesome-mobile-security)
---
@ -69,7 +69,7 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve
- **Static Analysis**: [PEStudio](https://www.winitor.com/), [Binwalk](https://github.com/ReFirmLabs/binwalk)
#### **Essential Resources**
0. [Awesome malware analysis](https://theredteam.tech/ch0ic3/awesome-malware-analysis)
0. [Awesome malware analysis](https://theredteam.tech/ch0ic3/awesome-malware-analysis) - git list like this one but only with malware resources
1. [Malware Unicorns Training](https://malwareunicorn.org/#/workshops) - Excellent workshops and guides for malware analysis.
2. [Practical Malware Analysis Labs](http://practicalmalwareanalysis.com/labs/) - Hands-on exercises to practice analysis.
3. [Remnux](https://remnux.org/) - A Linux distribution specifically tailored for malware analysis.
@ -118,9 +118,9 @@ Social engineering exploits human psychology to gain unauthorized access or gath
4. Monitor for unusual activity, such as unauthorized login attempts.
#### **Further Reading**
1. [Social Engineering: The Science of Human Hacking by Christopher Hadnagy](https://www.amazon.com/Social-Engineering-Science-Human-Hacking/dp/111943338X)
1. [Social Engineering: The Science of Human Hacking by Christopher Hadnagy MISSING]()
2. [Social Engineering Framework](https://www.social-engineer.org/framework/) - Comprehensive resource for understanding social engineering tactics.
3. [The Psychology of Information Security](https://www.amazon.com/Psychology-Information-Security-Liminal-Space/dp/0995743705) - Learn about human factors in cybersecurity.
3. [The Psychology of Information Security MISSING]() - Learn about human factors in cybersecurity.
#### **Hands-On Activities**
- Conduct phishing campaigns in a controlled environment using [Gophish](https://getgophish.com/).
@ -131,8 +131,8 @@ Social engineering exploits human psychology to gain unauthorized access or gath
Reverse engineering involves analyzing software or hardware to understand its design and behavior. This skill is essential for malware analysis, vulnerability research, and exploit development.
### **Recommended Books**
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical-Reverse-Engineering.pdf)
2. [The IDA Pro Book](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/The-IDA-Pro-Book.pdf)
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf)
2. [The IDA Pro Book MISSING]()
---