- by x32x01 ||
Awesome Hacking
A collection of awesome lists for hackers, pentesters & security researchers.
Awesome Repositories
Other Useful Repositories
A collection of awesome lists for hackers, pentesters & security researchers.
Awesome Repositories
Repository | Description |
---|---|
Collection of Android security related resources | |
Resources for learning about application security | |
List of resources which help during asset discovery phase of a security assessment engagement | |
List of Bug Bounty Programs and write-ups from the Bug Bounty hunters | |
Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis | |
This is a list of hacking research in the 3G/4G/5G cellular security space. | |
List of CTF frameworks, libraries, resources and softwares | |
Curated list of hacking environments where you can train your cyber skills legally and safely | |
List of awesome DevSecOps tools with the help from community experiments and contributions | |
A curated list of awesome resources about embedded and IoT security | |
Resources for learning about Exploit Development | |
List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis | |
List of awesome Hacking tutorials, tools and resources | |
Collection of hacking / penetration testing resources to make you better! | |
List of honeypot resources | |
List of tools for incident response | |
List of resources related to Industrial Control System (ICS) security | |
List of awesome infosec courses and training resources | |
Collection of Hacks in IoT Space | |
List of Awesome Mainframe Hacking/Pentesting Resources | |
List of awesome malware analysis tools and resources | |
List of amazingly awesome Open Source Intelligence (OSINT) tools and resources | |
OSX and iOS related security tools | |
Collection of tools developed by researchers in the Computer Science area to process network traces | |
List of awesome penetration testing resources, tools and other shiny things | |
Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities | |
Covers VoIP, WebRTC and VoLTE security related topics | |
List of Awesome Red Team / Red Teaming Resources | |
List of awesome reverse engineering resources | |
List of awesome reinforcement learning for security resources | |
List of awesome security talks | |
Collection of multiple types of lists used during security assessments | |
Collection of awesome software, libraries, documents, books, resources and cools stuffs about security | |
Collection of Serverless security related resources | |
List of awesome social engineering resources | |
List of static analysis tools, linters and code quality checkers for various programming languages | |
List of resources includes thousands of cybersecurity-related references and resources | |
List of Awesome Threat Intelligence resources | |
List of resources for learning about vehicle security and car hacking | |
List of resources about Vulnerability Research | |
List of web application security | |
A curated list of web3 Security materials and resources For Pentesters and Bug Hunters. | |
List of Awesome Advanced Windows Exploitation References | |
Pack of various useful/useless tools for 802.11 hacking | |
List of awesome YARA rules, tools, and people | |
A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking. |
Other Useful Repositories
Repository | Description |
---|---|
Curated list of awesome adversarial machine learning resources | |
Curated list of AI security resources | |
Checklist of the most important security countermeasures when designing, testing, and releasing your API | |
Various public documents, whitepapers and articles about APT campaigns | |
List of bug bounty write-up that is categorized by the bug nature | |
Cryptography resources and tools | |
List of Capture The Flag (CTF) frameworks, libraries, resources and softwares | |
List of CVE Proof of Concepts (PoCs) | |
List of CVE Proof of Concepts (PoCs) updated daily by Trickest | |
Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices | |
List of awesome forensic analysis tools and resources | |
Free programming books for developers | |
Useful for CTFs, wargames, pentesting | |
A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions | |
A free class for web security by HackerOne | |
A collection of resources, documentation, links, etc to help people learn about Infosec | |
Information Security Reference That Doesn't Suck | |
Collection of sources of indicators of compromise | |
A bunch of links related to Linux kernel fuzzing and exploitation | |
Resources relating to the security and compromise of locks, safes, and keys. | |
Curated list of tools and resources related to the use of machine learning for cyber security | |
Collection of web attack payloads | |
List of useful payloads and bypass for Web Application Security and Pentest/CTF | |
Collection of the cheat sheets useful for pentesting | |
A free online security knowledge library for pentesters / researchers | |
Wordlists sorted by probability originally created for password generation and testing | |
Collection of useful GitHub projects loosely categorised | |
List of Reverse Engineering articles, books, and papers | |
Collection of Radio Frequency Communication Protocol Hacktools | |
Collection of cheatsheets for various infosec tools and topics | |
Great security list for fun and profit | |
List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell | |
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns | |
Curated list of Web Security materials and resources | |
Pre-Built Vulnerable Environments Based on Docker-Compose |