x32x01
  • by x32x01 ||
Awesome Hacking
A collection of awesome lists for hackers, pentesters & security researchers.

Awesome Repositories

RepositoryDescription
You Can, Log in or Register To View URLs Content !
Collection of Android security related resources
You Can, Log in or Register To View URLs Content !
Resources for learning about application security
You Can, Log in or Register To View URLs Content !
List of resources which help during asset discovery phase of a security assessment engagement
You Can, Log in or Register To View URLs Content !
List of Bug Bounty Programs and write-ups from the Bug Bounty hunters
You Can, Log in or Register To View URLs Content !
Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis
You Can, Log in or Register To View URLs Content !
This is a list of hacking research in the 3G/4G/5G cellular security space.
You Can, Log in or Register To View URLs Content !
List of CTF frameworks, libraries, resources and softwares
You Can, Log in or Register To View URLs Content !
Curated list of hacking environments where you can train your cyber skills legally and safely
You Can, Log in or Register To View URLs Content !
List of awesome DevSecOps tools with the help from community experiments and contributions
You Can, Log in or Register To View URLs Content !
A curated list of awesome resources about embedded and IoT security
You Can, Log in or Register To View URLs Content !
Resources for learning about Exploit Development
You Can, Log in or Register To View URLs Content !
List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis
You Can, Log in or Register To View URLs Content !
List of awesome Hacking tutorials, tools and resources
You Can, Log in or Register To View URLs Content !
Collection of hacking / penetration testing resources to make you better!
You Can, Log in or Register To View URLs Content !
List of honeypot resources
You Can, Log in or Register To View URLs Content !
List of tools for incident response
You Can, Log in or Register To View URLs Content !
List of resources related to Industrial Control System (ICS) security
You Can, Log in or Register To View URLs Content !
List of awesome infosec courses and training resources
You Can, Log in or Register To View URLs Content !
Collection of Hacks in IoT Space
You Can, Log in or Register To View URLs Content !
List of Awesome Mainframe Hacking/Pentesting Resources
You Can, Log in or Register To View URLs Content !
List of awesome malware analysis tools and resources
You Can, Log in or Register To View URLs Content !
List of amazingly awesome Open Source Intelligence (OSINT) tools and resources
You Can, Log in or Register To View URLs Content !
OSX and iOS related security tools
You Can, Log in or Register To View URLs Content !
Collection of tools developed by researchers in the Computer Science area to process network traces
You Can, Log in or Register To View URLs Content !
List of awesome penetration testing resources, tools and other shiny things
You Can, Log in or Register To View URLs Content !
Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities
You Can, Log in or Register To View URLs Content !
Covers VoIP, WebRTC and VoLTE security related topics
You Can, Log in or Register To View URLs Content !
List of Awesome Red Team / Red Teaming Resources
You Can, Log in or Register To View URLs Content !
List of awesome reverse engineering resources
You Can, Log in or Register To View URLs Content !
List of awesome reinforcement learning for security resources
You Can, Log in or Register To View URLs Content !
List of awesome security talks
You Can, Log in or Register To View URLs Content !
Collection of multiple types of lists used during security assessments
You Can, Log in or Register To View URLs Content !
Collection of awesome software, libraries, documents, books, resources and cools stuffs about security
You Can, Log in or Register To View URLs Content !
Collection of Serverless security related resources
You Can, Log in or Register To View URLs Content !
List of awesome social engineering resources
You Can, Log in or Register To View URLs Content !
List of static analysis tools, linters and code quality checkers for various programming languages
You Can, Log in or Register To View URLs Content !
List of resources includes thousands of cybersecurity-related references and resources
You Can, Log in or Register To View URLs Content !
List of Awesome Threat Intelligence resources
You Can, Log in or Register To View URLs Content !
List of resources for learning about vehicle security and car hacking
You Can, Log in or Register To View URLs Content !
List of resources about Vulnerability Research
You Can, Log in or Register To View URLs Content !
List of web application security
You Can, Log in or Register To View URLs Content !
A curated list of web3 Security materials and resources For Pentesters and Bug Hunters.
You Can, Log in or Register To View URLs Content !
List of Awesome Advanced Windows Exploitation References
You Can, Log in or Register To View URLs Content !
Pack of various useful/useless tools for 802.11 hacking
You Can, Log in or Register To View URLs Content !
List of awesome YARA rules, tools, and people
You Can, Log in or Register To View URLs Content !
A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking.

Other Useful Repositories
RepositoryDescription
You Can, Log in or Register To View URLs Content !
Curated list of awesome adversarial machine learning resources
You Can, Log in or Register To View URLs Content !
Curated list of AI security resources
You Can, Log in or Register To View URLs Content !
Checklist of the most important security countermeasures when designing, testing, and releasing your API
You Can, Log in or Register To View URLs Content !
Various public documents, whitepapers and articles about APT campaigns
You Can, Log in or Register To View URLs Content !
List of bug bounty write-up that is categorized by the bug nature
You Can, Log in or Register To View URLs Content !
Cryptography resources and tools
You Can, Log in or Register To View URLs Content !
List of Capture The Flag (CTF) frameworks, libraries, resources and softwares
You Can, Log in or Register To View URLs Content !
List of CVE Proof of Concepts (PoCs)
You Can, Log in or Register To View URLs Content !
List of CVE Proof of Concepts (PoCs) updated daily by Trickest
You Can, Log in or Register To View URLs Content !
Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
You Can, Log in or Register To View URLs Content !
List of awesome forensic analysis tools and resources
You Can, Log in or Register To View URLs Content !
Free programming books for developers
You Can, Log in or Register To View URLs Content !
Useful for CTFs, wargames, pentesting
You Can, Log in or Register To View URLs Content !
A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions
You Can, Log in or Register To View URLs Content !
A free class for web security by HackerOne
You Can, Log in or Register To View URLs Content !
A collection of resources, documentation, links, etc to help people learn about Infosec
You Can, Log in or Register To View URLs Content !
Information Security Reference That Doesn't Suck
You Can, Log in or Register To View URLs Content !
Collection of sources of indicators of compromise
You Can, Log in or Register To View URLs Content !
A bunch of links related to Linux kernel fuzzing and exploitation
You Can, Log in or Register To View URLs Content !
Resources relating to the security and compromise of locks, safes, and keys.
You Can, Log in or Register To View URLs Content !
Curated list of tools and resources related to the use of machine learning for cyber security
You Can, Log in or Register To View URLs Content !
Collection of web attack payloads
You Can, Log in or Register To View URLs Content !
List of useful payloads and bypass for Web Application Security and Pentest/CTF
You Can, Log in or Register To View URLs Content !
Collection of the cheat sheets useful for pentesting
You Can, Log in or Register To View URLs Content !
A free online security knowledge library for pentesters / researchers
You Can, Log in or Register To View URLs Content !
Wordlists sorted by probability originally created for password generation and testing
You Can, Log in or Register To View URLs Content !
Collection of useful GitHub projects loosely categorised
You Can, Log in or Register To View URLs Content !
List of Reverse Engineering articles, books, and papers
You Can, Log in or Register To View URLs Content !
Collection of Radio Frequency Communication Protocol Hacktools
You Can, Log in or Register To View URLs Content !
Collection of cheatsheets for various infosec tools and topics
You Can, Log in or Register To View URLs Content !
Great security list for fun and profit
You Can, Log in or Register To View URLs Content !
List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell
You Can, Log in or Register To View URLs Content !
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns
You Can, Log in or Register To View URLs Content !
Curated list of Web Security materials and resources
You Can, Log in or Register To View URLs Content !
Pre-Built Vulnerable Environments Based on Docker-Compose
 

Similar Threads

x32x01
  • x32x01
Replies
0
Views
256
x32x01
x32x01
TAGs: Tags
awesome hacking hacking tools

Register & Login Faster

Forgot your password?

Latest Resources

Forum Statistics

Threads
507
Messages
508
Members
42
Latest Member
Mustafa123
Back
Top