整理了一套很棒的在线渗透测试资源合集

信息安全 631 Views

  • Metasploit UnleashedPTESOWASPOSSTMM

  • LSST

  • Kernelnewbies

  • Shellcode TutorialsShellcode examples

  • Social Engineering Framework

  • Schuyler Towne channel

  • KaliNSTPentooBackBox

  • MetasploitBurp

  • NetsparkerNexposeNessusNiktoOpenVASOWASP Zed Attack Proxyw3afWapiti

  • nmaptcpdump/libpcapWiresharkNetwork Toolsnetsniff-ngIntercepter-NG

  • SSLyze

  • HexEdit.js

  • John the RipperOnline MD5 cracker

  • Sysinternals SuiteWindows Credentials Editor

  • LOICJS LOIC

  • SET

  • TorI2P

  • IDA ProWDK/WinDbgOllyDbg

  • The Art of Exploitation by Jon Erickson, 2008

  • Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011

  • Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014

  • Rtfm: Red Team Field Manual by Ben Clark, 2014

  • <a href="http://www.amazon.com/The-%3Ca%20class=" channel_keylink"="" target="_blank" style="color: rgb(65, 131, 196); outline: none; box-sizing: border-box; font-size: 14px; font-family: 微软雅黑, 'Microsoft YaHei';">Hacker-Playbook-Practical-Penetration/dp/1494932636/">The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013

  • Professional Penetration Testing by Thomas Wilhelm, 2013

  • Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012

  • Violent Python by TJ O'Connor, 2012

  • Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, Pedram Amini, 2007

  • The Shellcoders Handbook by Chris Anley and others, 2007

  • The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011

  • iOS Hackers Handbook by Charlie Miller and others, 2012

  • Android Hackers Handbook by Joshua J. Drake and others, 2014

  • The Browser Hackers Handbook by Wade Alcorn and others, 2014

  • Nmap Network Scanning by Gordon Fyodor Lyon, 2009

  • Practical Packet Analysis by Chris Sanders, 2011

  • Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012

  • Reverse Engineering for Beginners by Dennis Yurichev (free!)

  • The IDA Pro Book by Chris Eagle, 2011

  • Practical Reverse Engineering by Bruce Dang and others, 2014

  • Reverse Engineering for Beginners

  • Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012

  • The Art of Memory Forensics by Michael Hale Ligh and others, 2014

  • Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu

  • The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002

  • The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005

  • Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011

  • No Tech Hacking by Johnny Long, Jack Wiles, 2008

  • Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010

  • Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014

  • Practical Lock Picking by Deviant Ollam, 2012

  • Keys to the Kingdom by Deviant Ollam, 2012

  • NVDCERTOSVDBBugtraqExploit-DBFulldisclosureMS BulletinMS AdvisoryInj3ct0rPacket StormSecuriTeamCXSecurityVulnerability LaboratoryZDI

  • Offensive Security TrainingSANS Security TrainingOpen Security TrainingCTF Field Guide

  • DEF CONBlack HatBSidesCCCDerbyConPhreakNICShmooConCarolinaConHOPESummerConHack.luHITBTroopersHack3rConThotConLayerOneDeepSecSkyDogCon

  • 2600: The Hacker QuarterlyHakin9

  • SecToolsC/C++ Programming.NET ProgrammingShell ScriptingRuby Programming by @dreikanterRuby Programming by @marketsRuby Programming by @SdogruyolJavaScript ProgrammingNode.js Programming by @sindresorhusNode.js Programming by @vndmtrxPython tools for penetration testersPython Programming by @svakshaPython Programming by @vintaAndorid SecurityAwesome Awesomness总结

    感谢大家的支持!!

  • 如未说明则本站原创,转载请注明出处:NULL » 整理了一套很棒的在线渗透测试资源合集