{"id":4051,"url":"https://github.com/Hack-with-Github/Awesome-Hacking","name":"Awesome-Hacking","description":"A collection of various awesome lists for hackers, pentesters and security researchers","projects_count":83,"last_synced_at":"2026-04-26T22:00:25.419Z","repository":{"id":37262224,"uuid":"55076063","full_name":"Hack-with-Github/Awesome-Hacking","owner":"Hack-with-Github","description":"A collection of various awesome lists for hackers, pentesters and security researchers","archived":false,"fork":false,"pushed_at":"2026-04-20T14:27:49.000Z","size":176,"stargazers_count":110617,"open_issues_count":37,"forks_count":10187,"subscribers_count":3956,"default_branch":"master","last_synced_at":"2026-04-20T16:15:10.068Z","etag":null,"topics":["android","awesome","bug-bounty","fuzzing","hacking","penetration-testing","pentesting-windows","reverse-engineering","security"],"latest_commit_sha":null,"homepage":null,"language":null,"has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"cc0-1.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Hack-with-Github.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"contributing.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2016-03-30T15:47:10.000Z","updated_at":"2026-04-20T16:05:08.000Z","dependencies_parsed_at":"2023-12-10T08:24:30.793Z","dependency_job_id":"dde70b58-dfcd-48c8-90d9-81d978da48d0","html_url":"https://github.com/Hack-with-Github/Awesome-Hacking","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/Hack-with-Github/Awesome-Hacking","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Hack-with-Github","download_url":"https://codeload.github.com/Hack-with-Github/Awesome-Hacking/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":32314116,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-26T21:09:39.134Z","status":"ssl_error","status_checked_at":"2026-04-26T21:09:21.240Z","response_time":129,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"created_at":"2024-01-06T20:24:45.457Z","updated_at":"2026-04-26T22:00:25.420Z","primary_language":null,"list_of_lists":false,"displayable":true,"categories":["Awesome Repositories","Other Useful Repositories","Need More ?"],"sub_categories":[],"readme":"![Awesome Hacking](awesome_hacking.jpg)\n\n# [Awesome Hacking](https://github.com/Hack-with-Github/Awesome-Hacking) [![Tweet](https://img.shields.io/twitter/url/http/shields.io.svg?style=social)](https://twitter.com/intent/tweet?text=Awesome%20Hacking%20-%20a%20collection%20of%20awesome%20lists%20for%20hackers%20and%20pentesters%20by%20@HackwithGithub\u0026url=https://github.com/Hack-with-Github/Awesome-Hacking\u0026hashtags=security,hacking)\n\n**A collection of awesome lists for hackers, pentesters \u0026 security researchers.**\n\nYour [contributions](contributing.md) are always welcome !\n\n## Awesome Repositories\n\nRepository | Description\n---- | ----\n[Android Security](https://github.com/ashishb/android-security-awesome) | Collection of Android security related resources\n[AppSec](https://github.com/paragonie/awesome-appsec) | Resources for learning about application security\n[Asset Discovery](https://github.com/redhuntlabs/Awesome-Asset-Discovery) | List of resources which help during asset discovery phase of a security assessment engagement\n[Bug Bounty](https://github.com/djadmin/awesome-bug-bounty) | List of Bug Bounty Programs and write-ups from the Bug Bounty hunters\n[Cellular Hacking](https://github.com/W00t3k/Awesome-Cellular-Hacking) | This is a list of hacking research in the 3G/4G/5G cellular security space. \n[CI/CD Attacks](https://github.com/TupleType/awesome-cicd-attacks) | Offensive research of CI/CD systems and deployment processes\n[CTF](https://github.com/apsdehal/awesome-ctf) | List of CTF frameworks, libraries, resources and softwares\n[Cyber Security University](https://github.com/brootware/awesome-cyber-security-university) | Free educational resources that focus on learning cybersecurity by doing\n[Cyber Skills](https://github.com/joe-shenouda/awesome-cyber-skills) | Curated list of hacking environments where you can train your cyber skills legally and safely\n[Cybersources](https://github.com/bst04/CyberSources) | A collection of all types of tools and resources for cybersecurity\n[Detection Engineering](https://github.com/infosecB/awesome-detection-engineering) | Resources for designing, building, and operating detective cybersecurity controls\n[DevSecOps](https://github.com/devsecops/awesome-devsecops) | List of awesome DevSecOps tools with the help from community experiments and contributions\n[Drone Hacking](https://github.com/nicholasaleks/Awesome-Drone-Hacking) | List of Drone hacking tools and resources\n[Embedded and IoT Security](https://github.com/fkie-cad/awesome-embedded-and-iot-security) | A curated list of awesome resources about embedded and IoT security\n[Fuzzing](https://github.com/secfigo/Awesome-Fuzzing) | List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis\n[Hacking](https://github.com/carpedm20/awesome-hacking) | List of awesome Hacking tutorials, tools and resources\n[Honeypots](https://github.com/paralax/awesome-honeypots) | List of honeypot resources\n[Incident Response](https://github.com/meirwah/awesome-incident-response) | List of tools for incident response\n[Industrial Control System Security](https://github.com/hslatman/awesome-industrial-control-system-security) | List of resources related to Industrial Control System (ICS) security\n[InfoSec](https://github.com/onlurking/awesome-infosec) | List of awesome infosec courses and training resources\n[IoT and Hardware Security](https://github.com/kayranfatih/awesome-iot-and-hardware-security) | Collection of tools, books, resources and software about IoT and hardware security\n[Mainframe Hacking](https://github.com/samanL33T/Awesome-Mainframe-Hacking) | List of Awesome Mainframe Hacking/Pentesting Resources\n[Malware Analysis](https://github.com/rshipp/awesome-malware-analysis) | List of awesome malware analysis tools and resources\n[Malware Persistence](https://github.com/Karneades/awesome-malware-persistence) | Techniques adversaries use to maintain system access across restarts\n[Node.js Security](https://github.com/lirantal/awesome-nodejs-security) | Curated list of tools, security incidents and other resources around Node.js security\n[OSINT](https://github.com/jivoi/awesome-osint) | List of amazingly awesome Open Source Intelligence (OSINT) tools and resources\n[OSX and iOS Security](https://github.com/ashishb/osx-and-ios-security-awesome) | OSX and iOS related security tools\n[Password Cracking](https://github.com/n0kovo/awesome-password-cracking) | Tools and resources for recovering passwords\n[Pcaptools](https://github.com/caesar0301/awesome-pcaptools) | Collection of tools developed by researchers in the Computer Science area to process network traces\n[Pentest](https://github.com/enaqx/awesome-pentest) | List of awesome penetration testing resources, tools and other shiny things\n[PHP Security](https://github.com/ziadoz/awesome-php#security) | Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities\n[Prompt Injection](https://github.com/Joe-B-Security/awesome-prompt-injection) | Prompt injection vulnerabilities targeting AI and LLM systems\n[Real-time Communications hacking \u0026 pentesting resources](https://github.com/EnableSecurity/awesome-rtc-hacking) | Covers VoIP, WebRTC and VoLTE security related topics\n[Red Teaming Toolkit](https://github.com/infosecn1nja/Red-Teaming-Toolkit) | Cutting-edge open-source security tools (OST) for red teamers and threat hunters\n[Reinforcement Learning for Cyber Security](https://github.com/Kim-Hammar/awesome-rl-for-cybersecurity) | List of awesome reinforcement learning for security resources\n[Reversing](https://github.com/HACKE-RC/awesome-reversing) | Collection of resources to learn Reverse Engineering from start\n[Sec Talks](https://github.com/PaulSec/awesome-sec-talks) | List of awesome security talks\n[SecLists](https://github.com/danielmiessler/SecLists) | Collection of multiple types of lists used during security assessments\n[Security](https://github.com/sbilly/awesome-security) | Collection of awesome software, libraries, documents, books, resources and cools stuffs about security\n[Social Engineering](https://github.com/giuliacassara/awesome-social-engineering) | List of awesome social engineering resources\n[Static Analysis](https://github.com/analysis-tools-dev/static-analysis) | List of static analysis tools, linters and code quality checkers for various programming languages\n[The Art of Hacking Series](https://github.com/The-Art-of-Hacking/h4cker) | List of resources  includes thousands of cybersecurity-related references and resources\n[Threat Intelligence](https://github.com/hslatman/awesome-threat-intelligence) | List of Awesome Threat Intelligence resources\n[Vehicle Security](https://github.com/jaredthecoder/awesome-vehicle-security) | List of resources for learning about vehicle security and car hacking\n[Web Hacking](https://github.com/infoslack/awesome-web-hacking) | List of web application security\n[Web3 Security](https://github.com/Anugrahsr/Awesome-web3-Security) | A curated list of web3 Security materials and resources For Pentesters and Bug Hunters.\n[YARA](https://github.com/InQuest/awesome-yara) | List of awesome YARA rules, tools, and people\n\n## Other Useful Repositories\n\nRepository | Description\n---- | ----\n[AI Security](https://github.com/DeepSpaceHarbor/Awesome-AI-Security) | Curated list of AI security resources\n[Annual Security Reports](https://github.com/jacobdjwilson/awesome-annual-security-reports) | Cybersecurity trends, insights, and challenges from annual reports\n[API Security Checklist](https://github.com/shieldfy/API-Security-Checklist) | Checklist of the most important security countermeasures when designing, testing, and releasing your API\n[APT Notes](https://github.com/kbandla/APTnotes) | Various public documents, whitepapers and articles about APT campaigns\n[Bug Bounty Reference](https://github.com/ngalongc/bug-bounty-reference) | List of bug bounty write-up that is categorized by the bug nature\n[Capsulecorp Pentest](https://github.com/r3dy/capsulecorp-pentest) | Vagrant+Ansible virtual network penetration testing lab. Companion to \"The Art of Network Penetration Testing\" by Royce Davis\n[Cryptography](https://github.com/sobolevn/awesome-cryptography) | Cryptography resources and tools\n[CVE PoC](https://github.com/trickest/cve) | List of CVE Proof of Concepts (PoCs) updated daily by Trickest\n[CyberChef](https://gchq.github.io/CyberChef/) | A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages.\n[Detection Lab](https://github.com/clong/DetectionLab) |  Vagrant \u0026 Packer scripts to build a lab environment complete with security tooling and logging best practices\n[Executable Packing](https://github.com/packing-box/awesome-executable-packing) | Resources about executable packing and unpacking\n[Forensics](https://github.com/Cugu/awesome-forensics) | List of awesome forensic analysis tools and resources\n[Free Programming Books](https://github.com/EbookFoundation/free-programming-books) | Free programming books for developers\n[GTFOBins](https://gtfobins.github.io) | A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions\n[Hacker101](https://github.com/Hacker0x01/hacker101) | A free class for web security by HackerOne\n[Infosec Getting Started](https://github.com/gradiuscypher/infosec_getting_started) | A collection of resources, documentation, links, etc to help people learn about Infosec\n[Infosec Reference](https://github.com/rmusser01/Infosec_Reference) | Information Security Reference That Doesn't Suck\n[IOC](https://github.com/sroberts/awesome-iocs) | Collection of sources of indicators of compromise\n[Linux Kernel Exploitation](https://github.com/xairy/linux-kernel-exploitation) | A bunch of links related to Linux kernel fuzzing and exploitation\n[Machine Learning for Cyber Security](https://github.com/jivoi/awesome-ml-for-cybersecurity) | Curated list of tools and resources related to the use of machine learning for cyber security\n[Payloads](https://github.com/foospidy/payloads) | Collection of web attack payloads\n[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | List of useful payloads and bypass for Web Application Security and Pentest/CTF\n[Pentest Wiki](https://github.com/nixawk/pentest-wiki) | A free online security knowledge library for pentesters / researchers\n[Probable Wordlists](https://github.com/berzerk0/Probable-Wordlists) | Wordlists sorted by probability originally created for password generation and testing\n[Red Team Physical Tools](https://github.com/DavidProbinsky/RedTeam-Physical-Tools) | Curated list of tools for physical security, red teaming, and tactical covert entry\n[Reverse Engineering](https://github.com/onethawt/reverseengineering-reading-list) | List of Reverse Engineering articles, books, and papers\n[RFSec-ToolKit](https://github.com/cn0xroot/RFSec-ToolKit) | Collection of Radio Frequency Communication Protocol Hacktools\n[Security Cheatsheets](https://github.com/OWASP/CheatSheetSeries) | OWASP Cheat Sheet Series for application security\n[Shell](https://github.com/alebcay/awesome-shell) | List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell\n[Suricata](https://github.com/satta/awesome-suricata) | Suricata IDS/IPS and network security monitoring resources\n[ThreatHunter-Playbook](https://github.com/OTRF/ThreatHunter-Playbook) | A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns\n[Tor](https://github.com/polycarbohydrate/awesome-tor) | Resources about the Tor network and anonymous communication\n[Vulhub](https://github.com/vulhub/vulhub) | Pre-Built Vulnerable Environments Based on Docker-Compose\n[Web Security](https://github.com/qazbnm456/awesome-web-security) | Curated list of Web Security materials and resources\n\n## Need More ?\n\nFollow **Hack with GitHub** on your favorite social media to get daily updates on interesting GitHub repositories related to Security.\n - Twitter : [@HackwithGithub](https://twitter.com/HackwithGithub)\n - Facebook : [HackwithGithub](https://www.facebook.com/HackwithGithub)\n\n## Contributions\n\nPlease have a look at [contributing.md](contributing.md)\n","projects_url":"https://awesome.ecosyste.ms/api/v1/lists/hack-with-github%2Fawesome-hacking/projects"}