Awesome-Hacking
  
  
    A collection of various awesome lists for hackers, pentesters and security researchers 
    https://github.com/Hack-with-Github/Awesome-Hacking
  
        Last synced: about 10 hours ago 
        JSON representation
    
- 
            
Awesome Repositories
- Android Security
 - AppSec
 - CTF
 - Embedded and IoT Security
 - Hacking
 - Honeypots
 - Incident Response
 - Malware Analysis
 - Pcaptools
 - PHP Security
 - Reversing
 - Security
 - Social Engineering
 - Static Analysis
 - Vehicle Security
 - Cybersources
 - Celluar Hacking
 - Cyber Skills
 - DevSecOps
 - Asset Discovery
 - Bug Bounty - ups from the Bug Bounty hunters
 - Capsulecorp Pentest
 - Exploit Development
 - Fuzzing
 - Hacking Resources
 - Industrial Control System Security
 - InfoSec
 - IoT Hacks
 - Mainframe Hacking
 - OSINT
 - OSX and iOS Security
 - Pentest
 - Real-time Communications hacking & pentesting resources
 - Red Teaming
 - Reinforcement Learning for Cyber Security
 - Sec Talks
 - SecLists
 - Web3 Security
 - Windows Exploitation - Advanced
 - The Art of Hacking Series - related references and resources
 - Threat Intelligence
 - Web Hacking
 - WiFi Arsenal
 - YARA
 - Hacker Roadmap
 - Serverless Security
 - Static Analysis
 - Social Engineering
 - Vulnerability Research
 - Reversing
 
 - 
            
Other Useful Repositories
- AI Security
 - Cryptography
 - Forensics
 - Free Programming Books
 - GTFOBins
 - Lockpicking
 - Shell - line frameworks, toolkits, guides and gizmos to make complete use of shell
 - ThreatHunter-Playbook
 - Web Security
 - Adversarial Machine Learning
 - API Security Checklist
 - APT Notes
 - Bug Bounty Reference - up that is categorized by the bug nature
 - CTF Tool
 - CVE PoC
 - CVE PoC updated daily
 - Detection Lab
 - Forensics
 - Hacker101
 - Infosec Getting Started
 - Infosec Reference
 - IOC
 - Linux Kernel Exploitation
 - Machine Learning for Cyber Security
 - Payloads
 - PayloadsAllTheThings
 - Pentest Cheatsheets
 - Pentest Wiki
 - Probable Wordlists
 - Resource List
 - Reverse Engineering
 - RFSec-ToolKit
 - Security Cheatsheets
 - Security List
 - Vulhub - Built Vulnerable Environments Based on Docker-Compose
 - CyberChef
 - Lockpicking
 - AI Security
 - Gray Hacker Resources
 - ThreatHunter-Playbook
 
 - 
            
Need More ?
 
            Programming Languages
          
          
        
            Sub Categories
          
          
            Keywords
          
          
              
                security
                25
              
              
                awesome
                24
              
              
                awesome-list
                24
              
              
                hacking
                16
              
              
                penetration-testing
                11
              
              
                list
                8
              
              
                pentest
                7
              
              
                infosec
                6
              
              
                vulnerability
                5
              
              
                cybersecurity
                5
              
              
                pentesting
                5
              
              
                privilege-escalation
                4
              
              
                exploit
                4
              
              
                iot
                3
              
              
                learning
                3
              
              
                dfir
                3
              
              
                fuzzing
                3
              
              
                owasp
                3
              
              
                awesome-lists
                3
              
              
                static-analysis
                2
              
              
                threat-intelligence
                2
              
              
                reverse-engineering
                2
              
              
                cheatsheet
                2
              
              
                xss
                2
              
              
                hardware
                2
              
              
                vulnerabilities
                2
              
              
                web-hacking
                2
              
              
                web-security
                2
              
              
                payloads
                2
              
              
                payload
                2
              
              
                ethical-hacking
                2
              
              
                ioc
                2
              
              
                ansible
                2
              
              
                information-security
                2
              
              
                redteam
                2
              
              
                education
                2
              
              
                ctf
                2
              
              
                vagrant
                2
              
              
                sdr
                2
              
              
                encryption
                2
              
              
                red-team
                2
              
              
                osx
                2
              
              
                bash
                2
              
              
                poc
                2
              
              
                cyber-security
                2
              
              
                cve
                2
              
              
                yara-rules
                2
              
              
                osint
                2
              
              
                malware-analysis
                2
              
              
                malware-research
                2