add PDF online read link

This commit is contained in:
liu1l 2017-08-07 18:45:23 +08:00
parent 8c575a2b7e
commit e1fa80d37c

View File

@ -7,6 +7,7 @@
## 网站 ## 网站
- [OpenSecurityTraining](http://opensecuritytraining.info/Welcome.html) - [OpenSecurityTraining](http://opensecuritytraining.info/Welcome.html)
- [sec-wiki](https://www.sec-wiki.com/)
- [Stanford Computer Security Laboratory](http://seclab.stanford.edu/) - [Stanford Computer Security Laboratory](http://seclab.stanford.edu/)
- [Shellcodes database for study cases](http://shell-storm.org/shellcode/) - [Shellcodes database for study cases](http://shell-storm.org/shellcode/)
- [Corelan Team Articles](https://www.corelan.be/index.php/articles/) - [Corelan Team Articles](https://www.corelan.be/index.php/articles/)
@ -29,9 +30,9 @@
## 文章 ## 文章
## 书籍 ## 书籍
- Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson - [Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson](https://leaksource.files.wordpress.com/2014/08/hacking-the-art-of-exploitation.pdf)
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et al - [The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et al](https://murdercube.com/files/Computers/Computer%20Security/Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.pdf)
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler 2nd Edition - [The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler 2nd Edition](http://staff.ustc.edu.cn/~sycheng/ssat/books/The.IDA.Pro.Book.2ed.pdf)
- Practical Malware Analysis by Michael Sikorski and Andrew Honig - [Practical Malware Analysis by Michael Sikorski and Andrew Honig](http://venom630.free.fr/pdf/Practical_Malware_Analysis.pdf)
- Practical Reverse Engineering by Dang, Gazet, Bachaalany - [Practical Reverse Engineering by Dang, Gazet, Bachaalany](https://repo.zenk-security.com/Reversing%20.%20cracking/Practical%20Reverse%20Engineering.pdf)
- Fuzzing: Brute Force Vulnerability Discovery - [Fuzzing: Brute Force Vulnerability Discovery](http://bxi.es/Reversing-Exploiting/Fuzzing%20Brute%20Force%20Vulnerability%20Discovery.pdf)