- Becoming the Hacker
- Adrian Pruteanu
- 51字
- 2021-06-11 13:38:56
Resources
Consult the following resources for more information on penetration testing tools and techniques:
- Metasploit: https://www.metasploit.com/
- WPScan: https://wpscan.org/
- CMSmap: https://github.com/Dionach/CMSmap
- Recon-NG (available in Kali Linux or via the Bitbucket repository): https://bitbucket.org/LaNMaSteR53/recon-ng
- OWASP XSS Filter Evasion Cheat Sheet: https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
- Elsobky's GitHub page: https://github.com/0xSobky
- Brutelogic cheat sheet: https://brutelogic.com.br/blog/cheat-sheet/
- SecLists repository: https://github.com/danielmiessler/SecLists
- FuzzDB: https://github.com/fuzzdb-project/fuzzdb
推薦閱讀
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- 計算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- Metasploit Penetration Testing Cookbook(Third Edition)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實(shí)踐
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 反黑命令與攻防從新手到高手(微課超值版)
- API攻防:Web API安全指南
- Spring Security(Third Edition)
- 解密彩虹團(tuán)隊非凡實(shí)戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊)
- 華為防火墻實(shí)戰(zhàn)指南
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 實(shí)用黑客攻防技術(shù)
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- Learn Azure Sentinel
- 網(wǎng)絡(luò)空間安全法律問題研究