Update DEVTools.md

This commit is contained in:
nbats 2024-02-03 14:24:23 -08:00 committed by GitHub
parent a259e89a69
commit 26e453f457
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -246,7 +246,6 @@
* [Hacksplaining](https://www.hacksplaining.com/) - Developer Security Lessons * [Hacksplaining](https://www.hacksplaining.com/) - Developer Security Lessons
* [sha256_project](https://github.com/oconnor663/sha256_project) - Applied Cryptography Course * [sha256_project](https://github.com/oconnor663/sha256_project) - Applied Cryptography Course
* [John Hammond](https://www.youtube.com/@_JohnHammond) or [LowLevelLearning](https://www.youtube.com/@LowLevelLearning/) - Cybersecurity YouTube Tutorials * [John Hammond](https://www.youtube.com/@_JohnHammond) or [LowLevelLearning](https://www.youtube.com/@LowLevelLearning/) - Cybersecurity YouTube Tutorials
* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer
*** ***
@ -895,6 +894,7 @@
* [MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet) - App Pentesting Cheatsheet * [MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet) - App Pentesting Cheatsheet
* [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://github.com/rizinorg/cutter) - Reverse Engineering * [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://github.com/rizinorg/cutter) - Reverse Engineering
* [MSTG](https://github.com/OWASP/owasp-mastg) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering * [MSTG](https://github.com/OWASP/owasp-mastg) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering
* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer
* [challenges.re](https://challenges.re/) - Reverse Engineer Code * [challenges.re](https://challenges.re/) - Reverse Engineer Code
* [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker * [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker
* [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App * [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App