...
 
Commits (5)
......@@ -44,8 +44,25 @@ Liste non objective et incomplète de liens utiles pour la sécurité informatiq
*[http://www.kalitutorials.net/ Kali Linux Hacking Tutorials]
*[http://aetherlab.teachable.com/p/burp-suite Learn Burp Suite]
==Outils==
==Challenges, CTF, systèmes vulnérables, exercices==
*[https://captf.com/practice-ctf/ Practice CTF list]
*[http://www.r00tsec.com/2011/02/pentest-lab-vulnerable-servers.html Pentest lab vulnerable servers-applications list]
*[http://exploit-exercises.com/ Nebula]
*[http://www.dvwa.co.uk/ DVWA - Damn Vulnerable Web Application]
*[https://google-gruyere.appspot.com/ Google Gruyere]
*[https://www.enigmagroup.org/ The Enigma Group]
*[https://www.vulnhub.com/entry/primer-101,136/ PRIMER]
*[https://pwnable.tw/ pwnable.tw]
=Outils=
*[https://www.yubico.com/ Yubico]
*[http://www.emposha.com/security/php-shell-detector-web-shell-detection-tool.html PHP Shell Detector]
==Pentest & audit==
*[https://www.kali.org/ Kali Linux]
*[http://www.metasploit.com/ Metasploit]
*[https://github.com/pentestmonkey/unix-privesc-check unix-privesc-check]
*[https://github.com/PenturaLabs/Linux_Exploit_Suggester Linux Exploit Suggester]
......@@ -54,13 +71,19 @@ Liste non objective et incomplète de liens utiles pour la sécurité informatiq
*[http://openwall.info/wiki/john/johnny Johnny - GUI for John the Ripper]
*[https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/ Pwning with Responder]
===Réseau===
==Réseau==
*[http://sectools.org/ SecTools]
*[http://www.packettotal.com/ PacketTotal]
*[https://www.ssllabs.com/ssltest/ Qualys SSL Labs - SSL Server Test]
*[https://mozilla.github.io/server-side-tls/ssl-config-generator/ Mozilla SSL config generator]
*[https://letsencrypt.org/ Let's Encrypt]
*[http://www.alcasar.net/ ALCASAR]
*[http://insecure.org/ Nmap]
*[http://www.iodigitalsec.com/fully-automatic-wireless-hacking-station/ Fully automatic wireless hacking station]
*[https://drive.google.com/drive/folders/0BxK09co0m6-_Q05RWmRCTHNYMjQ PDF exploit generator]
===Web===
==Web==
*[https://portswigger.net/burp/ Burp Suite]
*[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]
......@@ -73,31 +96,6 @@ Liste non objective et incomplète de liens utiles pour la sécurité informatiq
*[http://tools.kali.org/maintaining-access/weevely Weevely]
*[http://www.scrt.ch/attaque/telechargements/xssploit XSSploit]
==Challenges, CTF, systèmes vulnérables, exercices==
*[https://captf.com/practice-ctf/ Practice CTF list]
*[http://www.r00tsec.com/2011/02/pentest-lab-vulnerable-servers.html Pentest lab vulnerable servers-applications list]
*[http://exploit-exercises.com/ Nebula]
*[http://www.dvwa.co.uk/ DVWA - Damn Vulnerable Web Application]
*[https://google-gruyere.appspot.com/ Google Gruyere]
*[https://www.enigmagroup.org/ The Enigma Group]
*[https://www.vulnhub.com/entry/primer-101,136/ PRIMER]
*[https://pwnable.tw/ pwnable.tw]
=Outils=
*[https://www.yubico.com/ Yubico]
*[http://www.emposha.com/security/php-shell-detector-web-shell-detection-tool.html PHP Shell Detector]
==Réseau==
*[http://sectools.org/ SecTools]
*[http://www.packettotal.com/ PacketTotal]
*[https://www.ssllabs.com/ssltest/ Qualys SSL Labs - SSL Server Test]
*[https://mozilla.github.io/server-side-tls/ssl-config-generator/ Mozilla SSL config generator]
*[https://letsencrypt.org/ Let's Encrypt]
*[http://www.alcasar.net/ ALCASAR]
==Chiffrement==
*[http://truecrypt.sourceforge.net/ TrueCrypt]
......