Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
https://github.com/Hack-with-Github/Awesome-Hacking
Last synced: 4 days ago
JSON representation
-
Awesome Repositories
- PHP Security
- Static Analysis
- AppSec
- Security
- CTF
- Cyber Security University
- Malware Analysis
- Android Security
- Hacking
- Honeypots
- Incident Response
- Vehicle Security
- Embedded and IoT Security
- Malware Persistence
- Password Cracking
- Prompt Injection
- Pcaptools
- OSINT
- Hacking Resources
- Web3 Security
- WiFi Arsenal
- Asset Discovery
- Cellular Hacking
- Pentest
- DevSecOps
- Threat Intelligence
- YARA
- SecLists
- OSX and iOS Security
- Industrial Control System Security
- InfoSec
- The Art of Hacking Series - related references and resources
- Hacker Roadmap
- Bug Bounty - ups from the Bug Bounty hunters
- Red Teaming
- Web Hacking
- Red Teaming Toolkit - edge open-source security tools (OST) for red teamers and threat hunters
- Cyber Skills
- Exploit Development
- Fuzzing
- IoT Hacks
- Sec Talks
- Social Engineering
- Detection Engineering
- Reinforcement Learning for Cyber Security
- Node.js Security
- Windows Exploitation - Advanced
- Mainframe Hacking
- Real-time Communications hacking & pentesting resources
- Reversing
- CI/CD Attacks
- Cybersources
- Static Analysis
- Serverless Security
- Social Engineering
- Vulnerability Research
- Reversing
- Reinforcement Learning for Cyber Security
- Drone Hacking
- IoT and Hardware Security
-
Other Useful Repositories
- Cryptography
- Free Programming Books
- Shell - line frameworks, toolkits, guides and gizmos to make complete use of shell
- Web Security
- Executable Packing
- Suricata
- Security Cheatsheets
- Machine Learning for Cyber Security
- Hacker101
- AI Security
- PayloadsAllTheThings
- API Security Checklist
- CyberChef
- Vulhub - Built Vulnerable Environments Based on Docker-Compose
- Adversarial Machine Learning
- Pentest Wiki
- Detection Lab
- ThreatHunter-Playbook
- Payloads
- Pentest Cheatsheets
- Forensics
- IOC
- CVE PoC
- Infosec Reference
- Probable Wordlists
- CVE PoC
- Linux Kernel Exploitation
- APT Notes
- Bug Bounty Reference - up that is categorized by the bug nature
- CTF Tool
- Infosec Getting Started
- Resource List
- Reverse Engineering
- RFSec-ToolKit
- Security Cheatsheets
- Security List
- Tor
- Capsulecorp Pentest
- Red Team Physical Tools
- Annual Security Reports
- Lockpicking
- AI Security
- Gray Hacker Resources
- ThreatHunter-Playbook
-
Need More ?
Programming Languages
Sub Categories
Keywords
awesome-list
36
awesome
34
security
28
hacking
20
penetration-testing
12
cybersecurity
11
infosec
10
pentest
9
list
9
pentesting
7
owasp
5
vulnerability
5
malware-analysis
4
privilege-escalation
4
threat-intelligence
4
exploit
4
cyber-security
4
dfir
4
awesome-lists
4
appsec
4
threat-hunting
4
red-team
3
vulnerabilities
3
osint
3
malware-research
3
redteam
3
web-security
3
learning
3
fuzzing
3
iot
3
malware
3
education
3
static-analysis
3
poc
2
cve
2
payloads
2
vagrant
2
payload
2
redteaming
2
wordlist
2
password-safety
2
cheatsheet
2
mitre
2
ethical-hacking
2
bugbounty
2
web-hacking
2
ioc
2
cheatsheets
2
xss
2
malware-detection
2