Преглед на файлове

updated 'Pentesters arsenal tools' chapter

pull/52/head
@trimstray преди 3 години
committed by GitHub
родител
ревизия
af8e10bf33
No known key found for this signature in database GPG ключ ID: 4AEE18F83AFDEB23
променени са 1 файла, в които са добавени 2 реда и са изтрити 7 реда
  1. +2
    -7
      README.md

+ 2
- 7
README.md Целия файл

@@ -602,6 +602,8 @@ Linux Security Expert</b></a> - trainings, howtos, checklists, security tools an
&nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bl4de/security-tools"><b>security-tools</b></a> - collection of small security tools created mostly in Python. CTFs, pentests and so on.<br>
&nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/fuzzdb-project/fuzzdb"><b>fuzzdb</b></a> - dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.<br>
&nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/longld/peda"><b>GDB PEDA</b></a> - Python Exploit Development Assistance for GDB.<br>
&nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hex-rays.com/products/ida/index.shtml"><b>IDA</b></a> - multi-processor disassembler and debugger useful for reverse engineering malware.<br>
&nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/radare/radare2"><b>radare2</b></a> - framework for reverse-engineering and analyzing binaries.<br>
</p>

##### :black_small_square: Pentests bookmarks collection
@@ -633,13 +635,6 @@ Linux Security Expert</b></a> - trainings, howtos, checklists, security tools an
&nbsp;&nbsp;:small_orange_diamond: <a href="http://shell-storm.org/repo/CTF/"><b>shell-storm repo CTF</b></a> - great archive of CTFs.<br>
</p>

##### :black_small_square: Reverse Engineering Tools
<p>
&nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hopperapp.com/"><b>Hopper</b></a> - lets you disassemble, decompile and debug applications.<br>
&nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hex-rays.com/products/ida/"><b>IDA Pro</b></a> - generates assembly language source code from machine-executable code.<br>
&nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/radare/radare2"><b>radare2</b></a> - framework for reverse-engineering and analyzing binaries.<br>
</p>

##### :black_small_square: Bounty programs

<p>


Зареждане…
Отказ
Запис