Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-hacking
A repo full of information about hacking
https://github.com/cpscript/awesome-hacking
Last synced: 3 days ago
JSON representation
-
Other Useful Repositories
- Gray Hacker Resources
- Adversarial Machine Learning
- AI Security
- API Security Checklist
- APT Notes
- Bug Bounty Reference - up that is categorized by the bug nature
- Cryptography
- Adversarial Machine Learning
- AI Security
- API Security Checklist
- APT Notes
- Bug Bounty Reference - up that is categorized by the bug nature
- Cryptography
- CTF Tool
- CVE PoC
- CVE PoC updated daily
- CVE PoC
- PayloadsAllTheThings
- CVE PoC updated daily
- Detection Lab
- Forensics
- Free Programming Books
- Pentest Cheatsheets
- Hacker101
- Infosec Getting Started
- Infosec Reference
- IOC
- Linux Kernel Exploitation
- Machine Learning for Cyber Security
- Payloads
- Pentest Wiki
- Probable Wordlists
- Resource List
- Reverse Engineering
- RFSec-ToolKit
- Security Cheatsheets
- Security List
- Shell - line frameworks, toolkits, guides and gizmos to make complete use of shell
- ThreatHunter-Playbook
- Web Security
- Vulhub - Built Vulnerable Environments Based on Docker-Compose
- Detection Lab
- Forensics
- Security Cheatsheets
- Hacker101
- Infosec Getting Started
- Infosec Reference
- IOC
- Linux Kernel Exploitation
- Machine Learning for Cyber Security
- Payloads
- PayloadsAllTheThings
- Pentest Cheatsheets
- Pentest Wiki
- Probable Wordlists
- Resource List
- Reverse Engineering
- Security List
- Shell - line frameworks, toolkits, guides and gizmos to make complete use of shell
- ThreatHunter-Playbook
- Web Security
- Vulhub - Built Vulnerable Environments Based on Docker-Compose
- Lockpicking
-
Here is a collection of hackers, pentesters, security researchers, scripts and more:
- Honeypots
- Cyber Skills
- DevSecOps
- Embedded and IoT Security
- Exploit Development
- Fuzzing
- Hacking
- Hacking Resources
- Incident Response
- Industrial Control System Security
- InfoSec
- IoT Hacks
- Mainframe Hacking
- Android Security
- AppSec
- Asset Discovery
- Bug Bounty - ups from the Bug Bounty hunters
- Capsulecorp Pentest
- CTF
- Cyber Skills
- DevSecOps
- Embedded and IoT Security
- Exploit Development
- Fuzzing
- Hacking
- Hacking Resources
- Honeypots
- Incident Response
- Industrial Control System Security
- InfoSec
- IoT Hacks
- Mainframe Hacking
- Malware Analysis
- Malware Analysis
- OSINT
- OSINT
- OSX and iOS Security
- Pcaptools
- Pentest
- PHP Security
- Real-time Communications hacking & pentesting resources
- Red Teaming
- Reversing
- Reinforcement Learning for Cyber Security
- Sec Talks
- SecLists
- Security
- Serverless Security
- Social Engineering
- Static Analysis
- The Art of Hacking Series - related references and resources
- Threat Intelligence
- Vehicle Security
- Vulnerability Research
- Web Hacking
- Windows Exploitation - Advanced
- WiFi Arsenal
- YARA
- Hacker Roadmap
- OSX and iOS Security
- Pcaptools
- Pentest
- PHP Security
- Real-time Communications hacking & pentesting resources
- Red Teaming
- Reversing
- Reinforcement Learning for Cyber Security
- Sec Talks
- SecLists
- Serverless Security
- Social Engineering
- Static Analysis
- The Art of Hacking Series - related references and resources
- Threat Intelligence
- Vehicle Security
- Vulnerability Research
- YARA
- Web Hacking
- Windows Exploitation - Advanced
- WiFi Arsenal
- Hacker Roadmap
Programming Languages
Categories
Sub Categories
Keywords
awesome
47
security
46
awesome-list
40
hacking
30
penetration-testing
22
list
14
pentest
13
infosec
12
pentesting
10
vulnerability
10
exploit
8
privilege-escalation
8
cybersecurity
8
awesome-lists
6
dfir
6
vulnerabilities
5
web-security
5
fuzzing
5
iot
5
owasp
5
reverse-engineering
5
malware-research
4
yara-rules
4
red-team
4
malware-analysis
4
redteam
4
poc
4
osx
4
cheatsheet
4
cve
4
xss
4
threat-intelligence
4
ctf
4
appsec
4
information-security
4
web-hacking
4
learning
4
ioc
4
payload
4
payloads
4
bash
4
cryptography
3
osint
3
hardware
3
linux
3
ansible
3
ethical-hacking
3
vagrant
3
forensics
3
education
3