- Becoming the Hacker
- Adrian Pruteanu
- 42字
- 2021-06-11 13:38:52
Resources
Consult the following resources for more information on penetration testing tools and techniques:
- Penetration Testers Framework (PTF): https://github.com/trustedsec/ptf
- BlackArch: https://blackarch.org
- Burp Suite: https://portswigger.net/burp/
- OWASP ZAP: https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
- Amazon Web Services: https://aws.amazon.com
- Microsoft Azure: https://portal.azure.com
- Google Cloud Platform: https://cloud.google.com
- DigitalOcean: https://www.digitalocean.com
- Linode: https://www.linode.com
推薦閱讀
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 網(wǎng)絡(luò)安全與管理
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Learning Python for Forensics
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 學(xué)電腦安全與病毒防范
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- CTF那些事兒
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- INSTANT Apple Configurator How-to
- VMware vCloud Security
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- Bug Bounty Hunting Essentials
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見(jiàn)”的關(guān)鍵技術(shù)