干货大放送!Github最全渗透测试资源!
在线资源:渗透测试资源:Metasploit Unleashed - 免费攻防安全metasploita课程PTES - 渗透测试执行标准OWASP - 开源Web应用安全项目Shellcode开发:Shellcode Tutorials - 如何写shellcode的指导Shellcode Examples - Shellcode数据库社会工程学资源:社工库框架 - 社工所需信息资源"撬锁"(Lock Picking)资源:Schuyler Towne channel - 撬锁视频和安全演讲/r/lockpicking - 学习撬锁的资源和设备推荐渗透工具:渗透测试分布工具:Kali - 一个专门的数字取证和渗透测试的Linux版本BlackArch - 渗透测试员和研究人员的Arch Linux分布NST - 网络安全工具包Pentoo - 基于GentooBackBox - 基于Ubuntu的渗透测试和安全评估基本渗透测试工具:Metasploit Framework - 全球最常用的渗透测试工具Burp Suite - 执行Web安全测试的集成平台ExploitPack - 用户渗透测试的图形工具漏洞扫描器:Netsparker - Web应用程序安全扫描Nexpose - 漏洞管理和风险管理软件Nessus - 漏洞、配置和评估Nikto - Web应用漏洞扫描器OpenVAS - 开源漏洞扫描和管理工具OWASP Zed Attack Proxy - web应用的渗透测试工具Secapps - 集成的Web应用程序安全测试环境w3af - Web应用攻击和审计框架Wapiti - Web应用漏洞扫描器WebReaver - Mac OS X的Web应用漏洞扫描网络工具:nmap - 用于网络探测和安全审计的免费安全扫描器tcpdump/libpcap - 命令行的通用数据包分析器Wireshark - 网络协议分析,Unix和Windows版本均有Network Tools - 不同的网络工具:ping, lookup, whois, 等netsniff-ng - 瑞士军刀网络嗅探Intercepter-NG - 一个多功能网络工具包SPARTA - 网络基础架构渗透测试工具包无线网络工具:Aircrack-gn - 一系列无线网络审计工具Kismet - 无线网络探测器、嗅探器和入侵检测系统Reaver - WiFi暴力攻击SSL分析工具SSLyze - SSL配置扫描仪sslstrip - 一个HTTPS攻击演示十六进制编辑器HexEdit.js - 基于浏览器的十六进制编辑器破解工具John the Ripper - 最快的密码破解在线MD5破解 - 在线MD5哈希破解Windows UtilsSysinternals Suite - Sysinternals 故障诊断工具Windows Credentials Editor - 列出登录会话、添加、修改、列表、删除相关凭据的安全工具mimikatz - 针对Windows的凭证提取工具DDoS攻击工具LOIC - 开源的Windos网络压力工具JS LOIC - 浏览器的JavaScript LOIC社工工具SET - 来自TrustedSec的社工工具包OSint工具Maltego - 开源情报取证工具匿名工具Tor - 免费路由在线匿名工具I2P - 隐形互联网项目逆向工具IDA Pro - Windows、Linux或Mac OS X反编译调试器IDA Free - 免费版本的IDA 5.0WDK/WinDbg - Windows驱动程序工具包和WinDbgOllyDbg - x86调试器(强调二进制代码分析)Radare2 - 开源跨平台逆向工程框架x64_dgb - Windows 开源x64/x32调试器Pyew - 静态恶意软件分析的Python工具Bokken - Pyew Radare2 GUIImmunity Debugger - 开发、分析恶意软件的新工具Evan’s Debugger - Linux上类似于OllyDbg的调试器图书:渗透测试图书:The Art of Exploitation by Jon Erickson, 2008Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014Rtfm: Red Team Field Manual by Ben Clark, 2014The Hacker Playbook by Peter Kim, 2014The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013Professional Penetration Testing by Thomas Wilhelm, 2013Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012Violent Python by TJ O‘Connor, 2012Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, Pedram Amini, 2007Black Hat Python: Python Programming for Hackers and Pentesters, 2014Penetration Testing: Procedures & Methodologies (EC-Council Press),2010黑客手册系列The Shellcoders Handbook by Chris Anley and others, 2007The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011iOS Hackers Handbook by Charlie Miller and others, 2012Android Hackers Handbook by Joshua J. Drake and others, 2014The Browser Hackers Handbook by Wade Alcorn and others, 2014The Mobile Application Hackers Handbook by Dominic Chell and others, 2015网络分析图书Nmap Network Scanning by Gordon Fyodor Lyon, 2009Practical Packet Analysis by Chris Sanders, 2011Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012逆向工程图书Reverse Engineering for Beginners by Dennis Yurichev (free!)The IDA Pro Book by Chris Eagle, 2011Practical Reverse Engineering by Bruce Dang and others, 2014Reverse Engineering for Beginners恶意软件分析图书Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012The Art of Memory Forensics by Michael Hale Ligh and others, 2014Malware Analyst's Cookbook and DVD by Michael Hale Ligh and others, 2010Windows图书Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu社会工程学图书The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011No Tech Hacking by Johnny Long, Jack Wiles, 2008Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014撬锁系列图书Practical Lock Picking by Deviant Ollam, 2012Keys to the Kingdom by Deviant Ollam, 2012CIA Lock Picking Field Operative Training ManualLock Picking: Detail Overkill by SolomonEddie the Wire books漏洞数据库NVD - US National Vulnerability DatabaseCERT - US Computer Emergency Readiness TeamOSVDB - Open Sourced Vulnerability DatabaseBugtraq - Symantec SecurityFocusExploit-DB - Offensive Security Exploit DatabaseFulldisclosure - Full Disclosure Mailing ListMS Bulletin - Microsoft Security BulletinMS Advisory - Microsoft Security AdvisoriesInj3ct0r - Inj3ct0r Exploit DatabasePacket Storm - Packet Storm Global Security ResourceSecuriTeam - Securiteam Vulnerability InformationCXSecurity - CSSecurity Bugtraq ListVulnerability Laboratory - Vulnerability Research LaboratoryZDI - Zero Day Initiative安全课程Offensive Security Training - Training from BackTrack/Kali developersSANS Security Training - Computer Security Training & CertificationOpen Security Training - Training material for computer security classesCTF Field Guide - everything you need to win your next CTF competitionCybrary - online IT and Cyber Security training platform信息安全课程DEF CON - An annual hacker convention in Las VegasBlack Hat - An annual security conference in Las VegasBSides - A framework for organising and holding security conferencesCCC - An annual meeting of the international hacker scene in GermanyDerbyCon - An annual hacker conference based in LouisvillePhreakNIC - A technology conference held annually in middle TennesseeShmooCon - An annual US east coast hacker conventionCarolinaCon - An infosec conference, held annually in North CarolinaHOPE - A conference series sponsored by the hacker magazine 2600SummerCon - One of the oldest hacker conventions, held during SummerHack.lu - An annual conference held in LuxembourgHITB - Deep-knowledge security conference held in Malaysia and The NetherlandsTroopers - Annual international IT Security event with workshops held in Heidelberg, GermanyHack3rCon - An annual US hacker conferenceThotCon - An annual US hacker conference held in ChicagoLayerOne - An annual US security conerence held every spring in Los AngelesDeepSec - Security Conference in Vienna, AustriaSkyDogCon - A technology conference in NashvilleSECUINSIDE - Security Conference in SeoulDefCamp - Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania信息安全杂志2600: The Hacker Quarterly - An American publication about technology and computer "underground"Phrack Magazine - By far the longest running hacker zine非常有用的信息列表:SecTools - Top 125 Network Security ToolsC/C++ Programming - One of the main language for open source security tools.NET Programming - A software framework for Microsoft Windows platform developmentShell Scripting - Command-line frameworks, toolkits, guides and gizmosRuby Programming by @dreikanter - The de-facto language for writing exploitsRuby Programming by @markets - The de-facto language for writing exploitsRuby Programming by @Sdogruyol - The de-facto language for writing exploitsJavaScript Programming - In-browser development and scriptingNode.js Programming by @sindresorhus - JavaScript in command-lineNode.js Programming by @vndmtrx - JavaScript in command-linePython tools for penetration testers - Lots of pentesting tools are written in PythonPython Programming by @svaksha - General Python programmingPython Programming by @vinta - General Python programmingAndroid Security - A collection of android security related resourcesAwesome Awesomness - The List of the Lists