Skip to content

Commit

Permalink
Updated badges
Browse files Browse the repository at this point in the history
  • Loading branch information
Chan9390 committed Jun 7, 2018
1 parent 67d056d commit c88aee8
Show file tree
Hide file tree
Showing 61 changed files with 105 additions and 105 deletions.
4 changes: 2 additions & 2 deletions code_assessment/puma_scan.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ Puma Scan is a software security Visual Studio analyzer extension built on top o

#### BlackHat Arsenal sessions

[![Black Hat Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.toolswatch.org/2017/02/the-black-hat-arsenal-asia-2017-great-line-up/)
[![Black Hat Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Black Hat Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/asia/2017.svg)](https://www.toolswatch.org/2017/02/the-black-hat-arsenal-asia-2017-great-line-up/)
[![Black Hat Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](https://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
Expand Down
2 changes: 1 addition & 1 deletion cryptography/hashview.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Hashview is a web front-end to hashcat with many powerful features geared toward
* Reporting

### Black Hat sessions
[![Hashview](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#hashview-8019)
[![Hashview](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#hashview-8019)

### Code
https://github.com/hashview/hashview
Expand Down
2 changes: 1 addition & 1 deletion cryptography/thalos.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Thalos is a secure and distributed system for file storage in untrusted environm
* Cryptography

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)


### Popularity
Expand Down
2 changes: 1 addition & 1 deletion cryptography/whatsyoursign.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ Full details and usage instructions can be found [here](https://objective-see.co
* Malware Research

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)

### Code
https://github.com/objective-see/WhatsYourSign
Expand Down
4 changes: 2 additions & 2 deletions exploitation/avet.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,8 @@ What & Why:
* Ethical Hacking

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.toolswatch.org/2017/02/the-black-hat-arsenal-asia-2017-great-line-up/)
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/asia/2017.svg)](https://www.toolswatch.org/2017/02/the-black-hat-arsenal-asia-2017-great-line-up/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/govolution/avet
Expand Down
2 changes: 1 addition & 1 deletion exploitation/commix.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
* Vulnerability Assessment

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2015.svg)](https://www.blackhat.com/eu-15/arsenal.html#commix-detecting-and-exploiting-command-injection-flaws)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2015.svg)](https://www.blackhat.com/eu-15/arsenal.html#commix-detecting-and-exploiting-command-injection-flaws)

### Code
https://github.com/commixproject/commix
Expand Down
2 changes: 1 addition & 1 deletion exploitation/gef.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ pushing gdb compiled with Python3 support).

### Black Hat sessions

[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)


### Code
Expand Down
2 changes: 1 addition & 1 deletion exploitation/leviathan-framework.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ The main goal of this project is auditing as many system as possible in country-

### Black Hat sessions

[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#mailsniper-7907)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#mailsniper-7907)

### Code
https://github.com/leviathan-framework/leviathan
Expand Down
2 changes: 1 addition & 1 deletion exploitation/mailsniper.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ MailSniper includes additional modules for attacking externally-facing Outlook W

### Black Hat sessions

[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#mailsniper-7907)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#mailsniper-7907)

### Code
https://github.com/dafthack/MailSniper
Expand Down
2 changes: 1 addition & 1 deletion exploitation/rattler.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ Rattler enumerates an EXE's DLL's at runtime and provides a list of vulnerable D
* Vulnerability assessment

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/sensepost/rattler
Expand Down
2 changes: 1 addition & 1 deletion forensics/inVtero.net.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ and forensic platforms that are trivially compromised.
* Reverse Engineering

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/ShaneK2/inVtero.net
Expand Down
4 changes: 2 additions & 2 deletions forensics/userline.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,8 @@ This tool automates the process of creating logon relations from MS Windows Secu
* Incident Response

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2018.svg)](http://www.toolswatch.org/2018/01/black-hat-arsenal-asia-2018-great-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/asia/2018.svg)](http://www.toolswatch.org/2018/01/black-hat-arsenal-asia-2018-great-lineup/)

### Code
https://github.com/thiber-org/userline
Expand Down
2 changes: 1 addition & 1 deletion frameworks/defplorex.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ web pages at the time of compromise.
* Frameworks

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/trendmicro/defplorex
Expand Down
8 changes: 4 additions & 4 deletions frameworks/dradis_framework.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,10 +11,10 @@ Free forever and open source.
* Frameworks

### Black Hat sessions
[![Arsenal](https://www.toolswatch.org/badges/arsenal/2014.svg)](https://www.toolswatch.org/2014/09/lineup-for-the-blackhat-arsenal-europe-2014/)
[![Arsenal](https://www.toolswatch.org/badges/arsenal/2015.svg)](https://www.toolswatch.org/2015/06/black-hat-arsenal-usa-2015-speakers-lineup/)
[![Arsenal](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.blackhat.com/us-16/arsenal.html#dradis-framework)
[![Arsenal](https://rawgithub.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2014.svg)](https://www.toolswatch.org/2014/09/lineup-for-the-blackhat-arsenal-europe-2014/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2015.svg)](https://www.toolswatch.org/2015/06/black-hat-arsenal-usa-2015-speakers-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2016.svg)](https://www.blackhat.com/us-16/arsenal.html#dradis-framework)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)


### Code
Expand Down
2 changes: 1 addition & 1 deletion frameworks/halcyon_ide.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Halcyon IDE can understand Nmap library as well as traditional LUA syntax. Possi
* Vulnerability assessment

### Black Hat sessions
[![Arsenal (USA)](https://www.toolswatch.org/badges/arsenal/2016.svg)](http://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/) [![Arsenal (ASIA)](https://www.toolswatch.org/badges/arsenal/2016.svg)](http://www.toolswatch.org/2016/03/black-hat-arsenal-asia-2016-speakers-line-up/)
[![Arsenal (USA)](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2016.svg)](http://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/) [![Arsenal (ASIA)](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/asia/2016.svg)](http://www.toolswatch.org/2016/03/black-hat-arsenal-asia-2016-speakers-line-up/)

### Popularity

Expand Down
2 changes: 1 addition & 1 deletion frameworks/kubebot.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Kubebot also gives the flexibility of setting up scheduled job runs using the K8


### Black Hat sessions
[![Arsenal](https://rawgithub.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)


### Code
Expand Down
6 changes: 3 additions & 3 deletions hardening/lynis.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ Lynis is a security auditing tool for sytems running Linux, macOS, BSD, and othe
* Vulnerability assessment

### Black Hat sessions
[![Arsenal](https://www.toolswatch.org/badges/arsenal/2014.svg)](https://www.toolswatch.org/2014/09/lineup-for-the-blackhat-arsenal-europe-2014/)
[![Arsenal](https://www.toolswatch.org/badges/arsenal/2015.svg)](https://www.toolswatch.org/2015/06/black-hat-arsenal-usa-2015-speakers-lineup/)
[![Arsenal](https://www.toolswatch.org/badges/arsenal/2016.svg)](http://www.toolswatch.org/2016/09/the-black-hat-arsenal-europe-2016-line-up/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2014.svg)](https://www.toolswatch.org/2014/09/lineup-for-the-blackhat-arsenal-europe-2014/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2015.svg)](https://www.toolswatch.org/2015/06/black-hat-arsenal-usa-2015-speakers-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2016.svg)](http://www.toolswatch.org/2016/09/the-black-hat-arsenal-europe-2016-line-up/)

### Popularity

Expand Down
2 changes: 1 addition & 1 deletion hardware_iot/bsodomizer-hd.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ BSODomizer HD is an open source, FPGA-based, covert electronic device that injec
* Red Team

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/)

### Code
https://github.com/joegrand/bsodomizer-hd-c5g
Expand Down
4 changes: 2 additions & 2 deletions hardware_iot/jtagulator.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,8 @@ JTAGulator is an open source hardware hacking tool that assists in identifying o
* Vulnerability assessment

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2014.svg)](https://www.toolswatch.org/2014/06/black-hat-usa-2014-arsenal-tools-speaker-list/)
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2016.svg)](https://www.toolswatch.org/2016/09/the-black-hat-arsenal-europe-2016-line-up/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2014.svg)](https://www.toolswatch.org/2014/06/black-hat-usa-2014-arsenal-tools-speaker-list/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2016.svg)](https://www.toolswatch.org/2016/09/the-black-hat-arsenal-europe-2016-line-up/)

### Code
https://github.com/grandideastudio/jtagulator
Expand Down
2 changes: 1 addition & 1 deletion hardware_iot/opticspy.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ OpticSpy consists of two open source hardware modules that provide a low-cost wa
* Malware research

### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)

### Additional Resources
http://www.grandideastudio.com/portfolio/optical-covert-channels/
Expand Down
2 changes: 1 addition & 1 deletion hardware_iot/owasp_securetea.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ The purpose of this application is to warn the user (on twitter) whenever her la


### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2018/01/black-hat-arsenal-asia-2018-great-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/asia/2018.svg)](http://www.toolswatch.org/2018/01/black-hat-arsenal-asia-2018-great-lineup/)

### Code
* https://github.com/owasp-id/SecureTea
Expand Down
2 changes: 1 addition & 1 deletion hardware_iot/whid.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Based on an Atmega 32u4 (i.e. Keyboard, mouse and serial emulation) and a ESP-12

### Black Hat sessions

[![Black Hat Arsenal EU](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)
[![Black Hat Arsenal EU](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2017.svg)](https://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)

### Code
https://github.com/whid-injector/WHID
Expand Down
4 changes: 2 additions & 2 deletions ics_scada/dyode.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,8 @@ DYODE (Do Your Own Dyode) is a low cost, DIY data diode aimed at securing Indust

### Black Hat sessions

[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)

### Code
https://github.com/wavestone-cdt/dyode
Expand Down
2 changes: 1 addition & 1 deletion malware_research/ProcInfo.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Using this library, one can track processes during [malware analysis](https://sp


### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/objective-see/ProcInfo<br>
Expand Down
6 changes: 3 additions & 3 deletions malware_research/floss.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,13 +12,13 @@ FLOSS is extremely easy to use and works against a large corpus of malware. It f

### Black Hat sessions
#### Arsenal USA 2016
[![Arsenal](https://github.com/toolswatch/badges/blob/master/arsenal/usa/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/)

#### Arsenal Europe 2016
[![Arsenal](https://github.com/toolswatch/badges/blob/master/arsenal/europe/2016.svg)](https://www.toolswatch.org/2016/09/the-black-hat-arsenal-europe-2016-line-up/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2016.svg)](https://www.toolswatch.org/2016/09/the-black-hat-arsenal-europe-2016-line-up/)

#### Arsenal Asia 2018
[![Arsenal](https://github.com/toolswatch/badges/blob/master/arsenal/asia/2018.svg)](https://www.toolswatch.org/2018/01/black-hat-arsenal-asia-2018-great-lineup/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/asia/2018.svg)](https://www.toolswatch.org/2018/01/black-hat-arsenal-asia-2018-great-lineup/)

https://www.blackhat.com/asia-18/arsenal/schedule/

Expand Down
2 changes: 1 addition & 1 deletion malware_research/sniffMK.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ SniffMK was designed to facilitate malware analysis (specifically OSX/FruitFly w


### Black Hat sessions
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/objective-see/sniffMK
Expand Down
6 changes: 3 additions & 3 deletions mobile_hacking/androidtamer.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ Android Tamer project provides various resources for Android mobile application
* Penetration Testing

### Black Hat sessions
[![Arsenal-2015](https://www.toolswatch.org/badges/arsenal/2015.svg)](https://www.toolswatch.org/2015/10/black-hat-arsenal-europe-2015-line-up/)
[![Arsenal-2016](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/)
[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal-2015](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2015.svg)](https://www.toolswatch.org/2015/10/black-hat-arsenal-europe-2015-line-up/)
[![Arsenal-2016](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2016.svg)](https://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](https://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/AndroidTamer/AndroidTamer
Expand Down
2 changes: 1 addition & 1 deletion mobile_hacking/badintent.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ BadIntent integrates Android's Binder framework with Burp Suite. It enables pent
* Reverse Engineering

### Black Hat sessions
[![Arsenal US 2017](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#badintent---integrating-android-with-burp-8044)
[![Arsenal US 2017](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](https://www.blackhat.com/us-17/arsenal/schedule/#badintent---integrating-android-with-burp-8044)


### Code
Expand Down
2 changes: 1 addition & 1 deletion mobile_hacking/kwetza.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ Kwetza is a tool that allows you to infect an existing Android application with

### Black Hat sessions

[![Arsenal](https://rawgit.com/toolswatch/badges/master/arsenal/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
[![Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)

### Code
https://github.com/sensepost/kwetza
Expand Down
Loading

0 comments on commit c88aee8

Please sign in to comment.