From 1f6e0cb25ac0d45be09b4e68d85e45bd04694d9e Mon Sep 17 00:00:00 2001 From: Shay Molcho <152275799+shaymolcho@users.noreply.github.com> Date: Thu, 23 Jan 2025 20:20:39 +0200 Subject: [PATCH] Removed unnecessary periods in table for consistency Refactored the punctuation in a few lines within a table by removing unnecessary periods at the end of certain entries. This adjustment ensures that all rows in the table follow the same formatting style. --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 30aef2e..6c8c911 100644 --- a/README.md +++ b/README.md @@ -55,8 +55,8 @@ Repository | Description [Windows Exploitation - Advanced](https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References) | List of Awesome Advanced Windows Exploitation References [WiFi Arsenal](https://github.com/0x90/wifi-arsenal) | Pack of various useful/useless tools for 802.11 hacking [YARA](https://github.com/InQuest/awesome-yara) | List of awesome YARA rules, tools, and people -[Hacker Roadmap](https://github.com/sundowndev/hacker-roadmap) | A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking. -[Cybersources](https://github.com/brunoooost/cybersources) | A collection of all types of tools and resources for cybersecurity. +[Hacker Roadmap](https://github.com/sundowndev/hacker-roadmap) | A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking +[Cybersources](https://github.com/brunoooost/cybersources) | A collection of all types of tools and resources for cybersecurity ## Other Useful Repositories @@ -71,7 +71,7 @@ Repository | Description [CTF Tool](https://github.com/SandySekharan/CTF-tool) | List of Capture The Flag (CTF) frameworks, libraries, resources and softwares [CVE PoC](https://github.com/qazbnm456/awesome-cve-poc) | List of CVE Proof of Concepts (PoCs) [CVE PoC updated daily](https://github.com/trickest/cve) | List of CVE Proof of Concepts (PoCs) updated daily by Trickest -[CyberChef](https://gchq.github.io/CyberChef/) | A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. +[CyberChef](https://gchq.github.io/CyberChef/) | A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages [Detection Lab](https://github.com/clong/DetectionLab) | Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices [Forensics](https://github.com/Cugu/awesome-forensics) | List of awesome forensic analysis tools and resources [Free Programming Books](https://github.com/EbookFoundation/free-programming-books) | Free programming books for developers @@ -82,7 +82,7 @@ Repository | Description [Infosec Reference](https://github.com/rmusser01/Infosec_Reference) | Information Security Reference That Doesn't Suck [IOC](https://github.com/sroberts/awesome-iocs) | Collection of sources of indicators of compromise [Linux Kernel Exploitation](https://github.com/xairy/linux-kernel-exploitation) | A bunch of links related to Linux kernel fuzzing and exploitation -[Lockpicking](https://github.com/meitar/awesome-lockpicking) | Resources relating to the security and compromise of locks, safes, and keys. +[Lockpicking](https://github.com/meitar/awesome-lockpicking) | Resources relating to the security and compromise of locks, safes, and keys [Machine Learning for Cyber Security](https://github.com/jivoi/awesome-ml-for-cybersecurity) | Curated list of tools and resources related to the use of machine learning for cyber security [Payloads](https://github.com/foospidy/payloads) | Collection of web attack payloads [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | List of useful payloads and bypass for Web Application Security and Pentest/CTF