Browse Source

Update README.md

pull/4/head
Robert 7 years ago
parent
commit
88564c3ac9
1 changed files with 22 additions and 18 deletions
  1. +22
    -18
      README.md

+ 22
- 18
README.md View File

@ -11,21 +11,25 @@ Information Security Reference That Doesn't Suck
#####This page
* This page has links to *some* of the content on here. This is still very much a WIP. More content is within the Draft folder. If you want to contribute, feel free.
| Attacking |Defending |Other |
| :-------------------------|:-----------------------------------:|:-------------------|
| [Attacking/Defending Android](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Attacking%20Android.md) | [Attacking/Defending iOS](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Attacking%20iOS.md) - Needs a lot | [Appsec](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/AppSec.md) - More |
| [Building a Pen Test Lab](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Building%20A%20Pentest%20Lab.md) | [Computer Hardware attacks](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Computer%20Hardware%20Attacks.md) - Could use more quality content| [Con Videos](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Con%20Videos%20Stuff.md) |
| [Counter Surveillance](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Counter%20Surveillance.md) | [Crypto Currencies](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/CryptoCurrencies.md) | [Crypto](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Cryptography%20%26%20Encryption.md) |
| [CTFs & Wargames](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/CTFs%20%26%20Wargames.md) | [Darknets](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Darknets.md) | [Data Visualization](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Data%20Visualization.md) |[Disinformation](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Disinformation.md) |
| [Disclosure](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Disclosure.md) | [Documentation & Reporting](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Documentation%20%26%20Reports.md) | [Embedded Devie Security](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Embedded%20Device%20Security.md) |
| [Exploit Dev](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Exploit%20Development) | [Forensics](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Forensics.md) | [Fuzzing](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Fuzzing.md) |
| [Google Hacking](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Google%20Hacking.md) | [Hardware Hacking](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Hardware%20Hacking%20Teensy-like%20stuff.md) | [Honeypots](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Honeypots.md) |
| [Lockpicking](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Lockpicking.md) | [Logging](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Logging.md) | [Malware](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Malware.md) |
| [Network Attacks and Defense](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Network%20Attacks%20%26%20Defenses.md) | [Network Recon](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Network%20Reconnaissance%26Enumeration) | [Network Security Monitoring/Incident Response](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Network%20Security%20Monitoring.md) |
| [OSINT](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Open%20Source%20Intelligence.md) | [Passwords](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Password%20Bruting%20and%20Hashcracking.md) | Phishing: Under Client Side Attacks |
[Persistence](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Persistence.md) | [Privilege Escalation and Post-Exploitation](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/PrivEsc%20Post-Exploitation) | [Programming](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Programming%20-%20Languages%20Courses%20References.md) |
[Pwning Skiddies](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Pwning%20Skiddies.md) | [Reverse Engineering](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Reverse%20Engineering) | [Rootkits](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Rootkits.md) |
[Securing & Hardening](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Securing%20Hardening) | [Social Engineering](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Social%20Engineering.md) | [SDR](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Software%20Defined%20Radio) |
[SysInternals](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/System%20Internals%20Windows%20and%20Linux%20Internals%20Reference.md) | [Tor](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Tor.md) | [Threat Modeling](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Threat%20Modeling.md) |
| [UX/Design(because we all know pgp is sexy)](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/UX%20Design%20-%20Because%20we%20all%20know%20how%20sexy%20pgp%20is.md) | Sysadmin - Always more | [WebApp](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Web%20Applications) |
| [Wireless Networks](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Hardware%20Hacking%20Teensy-like%20stuff.md)- More info/structure |
| Offense(mostly) | Defense(mostly | Other |
| [Attacking/Defending Android](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Attacking%20Android.md) | [Appsec](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/AppSec.md) | [Building a Pen Test Lab](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Building%20A%20Pentest%20Lab.md) |
| [Attacking/Defending iOS](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Attacking%20iOS.md) | [Counter Surveillance](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Counter%20Surveillance.md) | [Con Videos](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Con%20Videos%20Stuff.md) |
| [Computer Hardware attacks](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Computer%20Hardware%20Attacks.md) | [Crypto](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Cryptography%20%26%20Encryption.md) | [Crypto Currencies](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/CryptoCurrencies.md) |
| [Embedded Devie Security](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Embedded%20Device%20Security.md) | [Data Visualization](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Data%20Visualization.md) | [CTFs & Wargames](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/CTFs%20%26%20Wargames.md) |
| [Exploit Dev](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Exploit%20Development) | [Disinformation](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Disinformation.md) | [Darknets](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Darknets.md) |
| [Fuzzing](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Fuzzing.md) | [Forensics](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Forensics.md) | [Disclosure](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Disclosure.md) |
| [Google Hacking](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Google%20Hacking.md) | [Honeypots](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Honeypots.md) | [Documentation & Reporting](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Documentation%20%26%20Reports.md) |
| [Hardware Hacking](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Hardware%20Hacking%20Teensy-like%20stuff.md) | [Network Security Monitoring/Incident Response](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Network%20Security%20Monitoring.md) | [Logging](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Logging.md) |
| [Lockpicking](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Lockpicking.md) | [Securing & Hardening](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Securing%20Hardening) | [Programming](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Programming%20-%20Languages%20Courses%20References.md) |
| [Malware](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Malware.md) | [Tor](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Tor.md) | [SDR](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Software%20Defined%20Radio) |
| [Network Attacks and Defense](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Network%20Attacks%20%26%20Defenses.md) | [Threat Modeling](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Threat%20Modeling.md) | [SysInternals](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/System%20Internals%20Windows%20and%20Linux%20Internals%20Reference.md) |
| [Network Recon](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Network%20Reconnaissance%26Enumeration) | | [UX/Design(because we all know pgp is sexy)](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/UX%20Design%20-%20Because%20we%20all%20know%20how%20sexy%20pgp%20is.md) |
| [OSINT](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Open%20Source%20Intelligence.md)| | | |
| [Passwords](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Password%20Bruting%20and%20Hashcracking.md) | | |
| [Persistence](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Persistence.md) | | |
| [Privilege Escalation and Post-Exploitation](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/PrivEsc%20Post-Exploitation) |
| [Reverse Engineering](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Reverse%20Engineering) | | |
| [Rootkits](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Rootkits.md) | | |
| [Social Engineering](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Social%20Engineering.md) | | |
| [WebApp](https://github.com/rmusser01/Infosec_Reference/tree/master/Draft/Draft/Web%20Applications) | | |
| Wireless Networks/Radios | | |

Loading…
Cancel
Save