...

Links

Scanning

  • Security Tools http://sectools.org
  • Awesome Penetration Testing https://github.com/enaqx/awesome-pentest
  • Network Tools https://github.com/enaqx/awesome-pentest#network-tools
  • Nmap book https://nmap.org/book/
  • SANS nmap cheat sheet https://pen-testing.sans.org/blog/2013/10/08/nmap-cheat-sheet-1-0
  • Pentest Tools Cheat Sheet – Recon and Enum https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/#recon-and-enumeration
  • Firewall/IDS Evasion and Spoofing https://nmap.org/book/man-bypass-firewalls-ids.html

Pentest methodologies

Recon tools

Vulnerabilities

 Post

Metasploitable

Content-Security-Policy