Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
fucking-Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴
https://github.com/Correia-jpv/fucking-Awesome-Hacking
Last synced: 5 days ago
JSON representation
-
Awesome Repositories
- Android Security
- AppSec
- Asset Discovery
- Bug Bounty - ups from the Bug Bounty hunters
- Capsulecorp Pentest
- Celluar Hacking
- CTF
- Cyber Skills
- DevSecOps
- Embedded and IoT Security
- Exploit Development
- Fuzzing
- Hacking
- Hacking Resources
- Honeypots
- Incident Response
- Industrial Control System Security
- InfoSec
- IoT Hacks
- Mainframe Hacking
- Malware Analysis
- OSINT
- OSX and iOS Security
- Pcaptools
- Pentest
- PHP Security
- Real-time Communications hacking & pentesting resources
- Red Teaming
- Reversing
- Reinforcement Learning for Cyber Security
- Sec Talks
- SecLists
- Security
- Serverless Security
- Social Engineering
- The Art of Hacking Series - related references and resources
- Threat Intelligence
- Vehicle Security
- Vulnerability Research
- Web Hacking
- Web3 Security
- Windows Exploitation - Advanced
- WiFi Arsenal
- YARA
- Hacker Roadmap
- Static Analysis
-
Other Useful Repositories
- Adversarial Machine Learning
- AI Security
- API Security Checklist
- APT Notes
- Bug Bounty Reference - up that is categorized by the bug nature
- Cryptography
- CTF Tool
- CVE PoC
- CVE PoC updated daily
- Detection Lab
- Forensics
- Free Programming Books
- Gray Hacker Resources
- Hacker101
- Infosec Getting Started
- Infosec Reference
- IOC
- Linux Kernel Exploitation
- Lockpicking
- Machine Learning for Cyber Security
- Payloads
- PayloadsAllTheThings
- Pentest Cheatsheets
- Pentest Wiki
- Probable Wordlists
- Resource List
- Reverse Engineering
- RFSec-ToolKit
- Security Cheatsheets
- Security List
- Shell - line frameworks, toolkits, guides and gizmos to make complete use of shell
- ThreatHunter-Playbook
- Web Security
- Vulhub - Built Vulnerable Environments Based on Docker-Compose
-
Source
Programming Languages
Sub Categories
Keywords
awesome
26
security
26
awesome-list
23
hacking
17
penetration-testing
12
list
8
infosec
7
pentest
7
vulnerability
5
pentesting
5
privilege-escalation
4
exploit
4
fuzzing
4
cybersecurity
4
awesome-lists
3
dfir
3
reverse-engineering
3
iot
3
osint
3
owasp
3
ioc
2
web-security
2
web-hacking
2
vulnerabilities
2
appsec
2
learning
2
yara-rules
2
cve
2
poc
2
red-team
2
information-security
2
education
2
xss
2
hardware
2
redteam
2
bug-bounty
2
osx
2
malware-research
2
malware-analysis
2
threat-intelligence
2
ctf
2
sdr
2
vagrant
2
ethical-hacking
2
ansible
2
android
2
payloads
2
payload
2
bash
2
cheatsheet
2