mirror of
https://github.com/nganhkhoa/CTF-All-In-One.git
synced 2024-12-25 11:41:16 +07:00
add PDF online read link
This commit is contained in:
parent
8c575a2b7e
commit
e1fa80d37c
@ -7,6 +7,7 @@
|
|||||||
|
|
||||||
## 网站
|
## 网站
|
||||||
- [OpenSecurityTraining](http://opensecuritytraining.info/Welcome.html)
|
- [OpenSecurityTraining](http://opensecuritytraining.info/Welcome.html)
|
||||||
|
- [sec-wiki](https://www.sec-wiki.com/)
|
||||||
- [Stanford Computer Security Laboratory](http://seclab.stanford.edu/)
|
- [Stanford Computer Security Laboratory](http://seclab.stanford.edu/)
|
||||||
- [Shellcodes database for study cases](http://shell-storm.org/shellcode/)
|
- [Shellcodes database for study cases](http://shell-storm.org/shellcode/)
|
||||||
- [Corelan Team Articles](https://www.corelan.be/index.php/articles/)
|
- [Corelan Team Articles](https://www.corelan.be/index.php/articles/)
|
||||||
@ -29,9 +30,9 @@
|
|||||||
## 文章
|
## 文章
|
||||||
|
|
||||||
## 书籍
|
## 书籍
|
||||||
- Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson
|
- [Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson](https://leaksource.files.wordpress.com/2014/08/hacking-the-art-of-exploitation.pdf)
|
||||||
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et al
|
- [The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et al](https://murdercube.com/files/Computers/Computer%20Security/Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.pdf)
|
||||||
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler 2nd Edition
|
- [The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler 2nd Edition](http://staff.ustc.edu.cn/~sycheng/ssat/books/The.IDA.Pro.Book.2ed.pdf)
|
||||||
- Practical Malware Analysis by Michael Sikorski and Andrew Honig
|
- [Practical Malware Analysis by Michael Sikorski and Andrew Honig](http://venom630.free.fr/pdf/Practical_Malware_Analysis.pdf)
|
||||||
- Practical Reverse Engineering by Dang, Gazet, Bachaalany
|
- [Practical Reverse Engineering by Dang, Gazet, Bachaalany](https://repo.zenk-security.com/Reversing%20.%20cracking/Practical%20Reverse%20Engineering.pdf)
|
||||||
- Fuzzing: Brute Force Vulnerability Discovery
|
- [Fuzzing: Brute Force Vulnerability Discovery](http://bxi.es/Reversing-Exploiting/Fuzzing%20Brute%20Force%20Vulnerability%20Discovery.pdf)
|
||||||
|
Loading…
Reference in New Issue
Block a user