{"id":13395143,"url":"https://github.com/Hack-with-Github/Awesome-Hacking","last_synced_at":"2025-03-13T20:31:54.475Z","repository":{"id":37262224,"uuid":"55076063","full_name":"Hack-with-Github/Awesome-Hacking","owner":"Hack-with-Github","description":"A collection of various awesome lists for hackers, pentesters and security researchers","archived":false,"fork":false,"pushed_at":"2024-04-13T12:39:36.000Z","size":155,"stargazers_count":78127,"open_issues_count":21,"forks_count":8721,"subscribers_count":3793,"default_branch":"master","last_synced_at":"2024-05-19T20:00:52.866Z","etag":null,"topics":["android","awesome","bug-bounty","fuzzing","hacking","penetration-testing","pentesting-windows","reverse-engineering","security"],"latest_commit_sha":null,"homepage":null,"language":null,"has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"cc0-1.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Hack-with-Github.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"contributing.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2016-03-30T15:47:10.000Z","updated_at":"2024-05-19T19:33:35.000Z","dependencies_parsed_at":"2023-12-10T08:24:30.793Z","dependency_job_id":"dde70b58-dfcd-48c8-90d9-81d978da48d0","html_url":"https://github.com/Hack-with-Github/Awesome-Hacking","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FAwesome-Hacking/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Hack-with-Github","download_url":"https://codeload.github.com/Hack-with-Github/Awesome-Hacking/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243478300,"owners_count":20297232,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","awesome","bug-bounty","fuzzing","hacking","penetration-testing","pentesting-windows","reverse-engineering","security"],"created_at":"2024-07-30T17:01:43.899Z","updated_at":"2025-03-13T20:31:54.468Z","avatar_url":"https://github.com/Hack-with-Github.png","language":null,"readme":"![Awesome Hacking](awesome_hacking.jpg)\n\n# [Awesome Hacking](https://github.com/Hack-with-Github/Awesome-Hacking) [![Tweet](https://img.shields.io/twitter/url/http/shields.io.svg?style=social)](https://twitter.com/intent/tweet?text=Awesome%20Hacking%20-%20a%20collection%20of%20awesome%20lists%20for%20hackers%20and%20pentesters%20by%20@HackwithGithub\u0026url=https://github.com/Hack-with-Github/Awesome-Hacking\u0026hashtags=security,hacking)\n\n**A collection of awesome lists for hackers, pentesters \u0026 security researchers.**\n\nYour [contributions](contributing.md) are always welcome !\n\n## Awesome Repositories\n\nRepository | Description\n---- | ----\n[Android Security](https://github.com/ashishb/android-security-awesome) \t\t\t| Collection of Android security related resources\n[AppSec](https://github.com/paragonie/awesome-appsec)\t\t\t\t\t\t\t\t| Resources for learning about application security\n[Asset Discovery](https://github.com/redhuntlabs/Awesome-Asset-Discovery)    | List of resources which help during asset discovery phase of a security assessment engagement\n[Bug Bounty](https://github.com/djadmin/awesome-bug-bounty) \t\t\t\t\t\t| List of Bug Bounty Programs and write-ups from the Bug Bounty hunters\n[Capsulecorp Pentest](https://github.com/r3dy/capsulecorp-pentest) \t\t\t\t\t\t| Vagrant+Ansible virtual network penetration testing lab. Companion to \"The Art of Network Penetration Testing\" by Royce Davis \n[Celluar Hacking](https://github.com/W00t3k/Awesome-Cellular-Hacking)    | This is a list of hacking research in the 3G/4G/5G cellular security space. \n[CTF](https://github.com/apsdehal/awesome-ctf) \t\t\t\t\t\t\t\t\t\t| List of CTF frameworks, libraries, resources and softwares\n[Cyber Skills](https://github.com/joe-shenouda/awesome-cyber-skills) | Curated list of hacking environments where you can train your cyber skills legally and safely\n[DevSecOps](https://github.com/devsecops/awesome-devsecops) \t\t\t\t\t\t| List of awesome DevSecOps tools with the help from community experiments and contributions\n[Embedded and IoT Security](https://github.com/fkie-cad/awesome-embedded-and-iot-security) | A curated list of awesome resources about embedded and IoT security\n[Exploit Development](https://github.com/FabioBaroni/awesome-exploit-development) \t| Resources for learning about Exploit Development\n[Fuzzing](https://github.com/secfigo/Awesome-Fuzzing) \t\t\t\t\t\t\t\t| List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis\n[Hacking](https://github.com/carpedm20/awesome-hacking) \t\t\t\t\t\t| List of awesome Hacking tutorials, tools and resources\n[Hacking Resources](https://github.com/vitalysim/Awesome-Hacking-Resources)          | Collection of hacking / penetration testing resources to make you better!\n[Honeypots](https://github.com/paralax/awesome-honeypots) \t\t\t\t\t\t\t| List of honeypot resources\n[Incident Response](https://github.com/meirwah/awesome-incident-response) \t\t\t| List of tools for incident response\n[Industrial Control System Security](https://github.com/hslatman/awesome-industrial-control-system-security)      | List of resources related to Industrial Control System (ICS) security\n[InfoSec](https://github.com/onlurking/awesome-infosec) \t\t\t\t\t\t\t| List of awesome infosec courses and training resources\n[IoT Hacks](https://github.com/nebgnahz/awesome-iot-hacks) \t\t\t\t\t\t\t| Collection of Hacks in IoT Space\n[Mainframe Hacking](https://github.com/samanL33T/Awesome-Mainframe-Hacking) \t\t\t\t| List of Awesome Mainframe Hacking/Pentesting Resources\n[Malware Analysis](https://github.com/rshipp/awesome-malware-analysis) \t\t\t\t| List of awesome malware analysis tools and resources\n[OSINT](https://github.com/jivoi/awesome-osint) \t\t\t\t\t\t\t\t\t | List of amazingly awesome Open Source Intelligence (OSINT) tools and resources\n[OSX and iOS Security](https://github.com/ashishb/osx-and-ios-security-awesome) \t| OSX and iOS related security tools\n[Pcaptools](https://github.com/caesar0301/awesome-pcaptools) \t\t\t\t\t\t| Collection of tools developed by researchers in the Computer Science area to process network traces\n[Pentest](https://github.com/enaqx/awesome-pentest) \t\t\t\t\t\t\t\t| List of awesome penetration testing resources, tools and other shiny things\n[PHP Security](https://github.com/ziadoz/awesome-php#security) \t\t\t\t\t\t| Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities\n[Real-time Communications hacking \u0026 pentesting resources](https://github.com/EnableSecurity/awesome-rtc-hacking) | Covers VoIP, WebRTC and VoLTE security related topics\n[Red Teaming](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) | List of Awesome Red Team / Red Teaming Resources\n[Reversing](https://github.com/fdivrp/awesome-reversing) \t\t\t\t\t\t| List of awesome reverse engineering resources\n[Reinforcement Learning for Cyber Security](https://github.com/Limmen/awesome-rl-for-cybersecurity) \t\t\t\t\t\t\t| List of awesome reinforcement learning for security resources\n[Sec Talks](https://github.com/PaulSec/awesome-sec-talks) \t\t\t\t\t\t\t| List of awesome security talks\n[SecLists](https://github.com/danielmiessler/SecLists) \t\t\t\t\t\t\t\t| Collection of multiple types of lists used during security assessments\n[Security](https://github.com/sbilly/awesome-security) \t\t\t\t\t\t\t\t| Collection of awesome software, libraries, documents, books, resources and cools stuffs about security\n[Serverless Security](https://github.com/puresec/awesome-serverless-security/) \t\t\t| Collection of Serverless security related resources\n[Social Engineering](https://github.com/v2-dev/awesome-social-engineering) | List of awesome social engineering resources\n[Static Analysis](https://github.com/mre/awesome-static-analysis) \t\t\t\t\t| List of static analysis tools, linters and code quality checkers for various programming languages\n[The Art of Hacking Series](https://github.com/The-Art-of-Hacking/h4cker)    | List of resources  includes thousands of cybersecurity-related references and resources\n[Threat Intelligence](https://github.com/hslatman/awesome-threat-intelligence) \t\t| List of Awesome Threat Intelligence resources\n[Vehicle Security](https://github.com/jaredthecoder/awesome-vehicle-security) \t| List of resources for learning about vehicle security and car hacking\n[Vulnerability Research](https://github.com/re-pronin/awesome-vulnerability-research) | List of resources about Vulnerability Research\n[Web Hacking](https://github.com/infoslack/awesome-web-hacking) \t\t\t\t\t| List of web application security\n[Web3 Security](https://github.com/Anugrahsr/Awesome-web3-Security) | A curated list of web3 Security materials and resources For Pentesters and Bug Hunters.\n[Windows Exploitation - Advanced](https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References) | List of Awesome Advanced Windows Exploitation References\n[WiFi Arsenal](https://github.com/0x90/wifi-arsenal) \t\t\t\t\t\t\t\t| Pack of various useful/useless tools for 802.11 hacking\n[YARA](https://github.com/InQuest/awesome-yara)                                     | List of awesome YARA rules, tools, and people\n[Hacker Roadmap](https://github.com/sundowndev/hacker-roadmap)                                     | A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking.\n[Cybersources](https://github.com/brunoooost/cybersources) | A collection of all types of tools and resources for cybersecurity.\n\n## Other Useful Repositories\n\nRepository | Description\n---- | ----\n[Adversarial Machine Learning](https://github.com/yenchenlin/awesome-adversarial-machine-learning) | Curated list of awesome adversarial machine learning resources\n[AI Security](https://github.com/RandomAdversary/Awesome-AI-Security) | Curated list of AI security resources\n[API Security Checklist](https://github.com/shieldfy/API-Security-Checklist) | Checklist of the most important security countermeasures when designing, testing, and releasing your API\n[APT Notes](https://github.com/kbandla/APTnotes) \t\t\t\t\t\t\t\t\t| Various public documents, whitepapers and articles about APT campaigns\n[Bug Bounty Reference](https://github.com/ngalongc/bug-bounty-reference) \t\t\t| List of bug bounty write-up that is categorized by the bug nature\n[Cryptography](https://github.com/sobolevn/awesome-cryptography) | Cryptography resources and tools\n[CTF Tool](https://github.com/SandySekharan/CTF-tool) \t\t\t\t\t\t\t\t| List of Capture The Flag (CTF) frameworks, libraries, resources and softwares\n[CVE PoC](https://github.com/qazbnm456/awesome-cve-poc) | List of CVE Proof of Concepts (PoCs)\n[CVE PoC updated daily](https://github.com/trickest/cve) | List of CVE Proof of Concepts (PoCs) updated daily by Trickest\n[CyberChef](https://gchq.github.io/CyberChef/) | A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages.\n[Detection Lab](https://github.com/clong/DetectionLab)                              |  Vagrant \u0026 Packer scripts to build a lab environment complete with security tooling and logging best practices\n[Forensics](https://github.com/Cugu/awesome-forensics) \t\t\t\t\t\t\t\t| List of awesome forensic analysis tools and resources\n[Free Programming Books](https://github.com/EbookFoundation/free-programming-books) \t\t\t| Free programming books for developers\n[Gray Hacker Resources](https://github.com/bt3gl/Gray-Hacker-Resources) \t\t\t| Useful for CTFs, wargames, pentesting\n[GTFOBins](https://gtfobins.github.io)\t| A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions\n[Hacker101](https://github.com/Hacker0x01/hacker101) | A free class for web security by HackerOne\n[Infosec Getting Started](https://github.com/gradiuscypher/infosec_getting_started)\t\t\t\t\t| A collection of resources, documentation, links, etc to help people learn about Infosec\n[Infosec Reference](https://github.com/rmusser01/Infosec_Reference) \t\t\t\t| Information Security Reference That Doesn't Suck\n[IOC](https://github.com/sroberts/awesome-iocs) \t\t\t\t\t\t\t\t\t| Collection of sources of indicators of compromise\n[Linux Kernel Exploitation](https://github.com/xairy/linux-kernel-exploitation) | A bunch of links related to Linux kernel fuzzing and exploitation\n[Lockpicking](https://github.com/meitar/awesome-lockpicking) | Resources relating to the security and compromise of locks, safes, and keys.\n[Machine Learning for Cyber Security](https://github.com/jivoi/awesome-ml-for-cybersecurity)   | Curated list of tools and resources related to the use of machine learning for cyber security\n[Payloads](https://github.com/foospidy/payloads)  | Collection of web attack payloads\n[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)   | List of useful payloads and bypass for Web Application Security and Pentest/CTF\n[Pentest Cheatsheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets)\t\t| Collection of the cheat sheets useful for pentesting\n[Pentest Wiki](https://github.com/nixawk/pentest-wiki) \t\t\t\t\t\t\t\t| A free online security knowledge library for pentesters / researchers\n[Probable Wordlists](https://github.com/berzerk0/Probable-Wordlists)  | Wordlists sorted by probability originally created for password generation and testing\n[Resource List](https://github.com/FuzzySecurity/Resource-List) \t\t\t\t\t| Collection of useful GitHub projects loosely categorised\n[Reverse Engineering](https://github.com/onethawt/reverseengineering-reading-list)   | List of Reverse Engineering articles, books, and papers\n[RFSec-ToolKit](https://github.com/cn0xroot/RFSec-ToolKit)  | Collection of Radio Frequency Communication Protocol Hacktools\n[Security Cheatsheets](https://github.com/andrewjkerr/security-cheatsheets) \t\t| Collection of cheatsheets for various infosec tools and topics\n[Security List](https://github.com/zbetcheckin/Security_list)\t\t\t\t\t\t | Great security list for fun and profit\n[Shell](https://github.com/alebcay/awesome-shell) \t\t\t\t\t\t\t\t\t| List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell\n[ThreatHunter-Playbook](https://github.com/Cyb3rWard0g/ThreatHunter-Playbook) | A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns\n[Web Security](https://github.com/qazbnm456/awesome-web-security) | Curated list of Web Security materials and resources\n[Vulhub](https://github.com/vulhub/vulhub) | Pre-Built Vulnerable Environments Based on Docker-Compose\n\n## Need More ?\n\nFollow **Hack with GitHub** on your favorite social media to get daily updates on interesting GitHub repositories related to Security.\n - Twitter : [@HackwithGithub](https://twitter.com/HackwithGithub)\n - Facebook : [HackwithGithub](https://www.facebook.com/HackwithGithub)\n\n## Contributions\n\nPlease have a look at [contributing.md](contributing.md)\n","funding_links":[],"categories":["Hacking and Pentesting","Others","▶️ Content","Uncategorized","miscellaneous","Misc","HarmonyOS","Awesome Lists","Ethical Hacking","List","Lists of lists","Index","other lists","Security","Related Awesome Lists","Awesome lists","Repositories Supporting First Timers","Git","Github resources","项目集合","Others (1002)","其他_安全与渗透","其它","Table of Contents","Other Lists","Awesome","Curated Lists","bug-bounty","⭐ Awesome","security","awesome","general","Infosec resources","[↑](#Contents)Links Domain","Awesome Repos","Shell Aliases","Common Lists","Welcome to Learn101","Comprehensive","Security \u0026 Hacking","Awesome lists :heart:","Skills:","Source"],"sub_categories":["Secure OSes","Security","Uncategorized","Windows Manager","awesome-*","Posts from Hacker101 members on how to get started hacking","网络服务_其他","Awesome Repos","TeX Lists","Vite","Video Conference","ColdFusion","C++","Chess :chess_pawn:","Other Lists","Hacker Awesome Repositories","Misc"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHack-with-Github%2FAwesome-Hacking","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FHack-with-Github%2FAwesome-Hacking","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHack-with-Github%2FAwesome-Hacking/lists"}