- https://wizardforcel.gitbooks.io/web-hacking-101/content/ Web Hacking 101 中文版
- https://wizardforcel.gitbooks.io/asani/content/ 浅入浅出Android安全 中文版
- https://wizardforcel.gitbooks.io/lpad/content/ Android 渗透测试学习手册 中文版
- https://wizardforcel.gitbooks.io/kali-linux-web-pentest-cookbook/content/ Kali Linux Web渗透测试秘籍 中文版
- https://github.com/hardenedlinux/linux-exploit-development-tutorial Linux exploit 开发入门
- https://www.gitbook.com/book/t0data/burpsuite/details burpsuite实战指南
- http://www.kanxue.com/?article-read-1108.htm=&winzoom=1 渗透测试Node.js应用
- https://github.com/qazbnm456/awesome-web-security Web安全资料和资源列表
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| INTRO | |
| I get asked regularly for good resources on AWS security. This gist collects some of these resources (docs, blogs, talks, open source tools, etc.). Feel free to suggest and contribute. | |
| Short Link: http://tiny.cc/awssecurity | |
| Official AWS Security Resources | |
| * Security Blog - http://blogs.aws.amazon.com/security/ | |
| * Security Advisories - http://aws.amazon.com/security/security-bulletins/ | |
| * Security Whitepaper (AWS Security Processes/Practices) - http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf | |
| * Security Best Practices Whitepaper - http://media.amazonwebservices.com/AWS_Security_Best_Practices.pdf |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Well, I suppose its `safe' to release this, it seems everyone and their dog has | |
| it and apparantly (and to my surprise) it still works. | |
| The `smurf' attack is quite simple. It has a list of broadcast addresses which | |
| it stores into an array, and sends a spoofed icmp echo request to each of those | |
| addresses in series and starts again. The result is a devistating attack upon | |
| the spoofed ip with, depending on the amount of broadcast addresses used, | |
| many, many computers responding to the echo request. | |
| Before I continue may I first say that this code was a mistake. When it was |
NewerOlder