awesome-hacking
π Welcome to Hack-Academia, your ultimate resource hub for all things π₯οΈ hacking, π§ pentesting, and π‘οΈ security research. Whether you are a π± beginner looking to explore the world of cybersecurity or a π§βπ» seasoned professional seeking cutting-edge techniques and insights, Hack-Academia is here to empower you. β‘
https://github.com/hunterdii/awesome-hacking
Last synced: about 9 hours ago
JSON representation
-
π Valuable Repositories
- PHP Security
- AppSec
- Security
- CTF
- Malware Analysis
- Android Security
- Hacking
- Honeypots
- Incident Response
- Vehicle Security
- Embedded and IoT Security
- Pcaptools
- OSINT
- Hacking Resources
- Web3 Security
- WiFi Arsenal
- Asset Discovery
- Cellular Hacking
- Pentest
- DevSecOps
- Threat Intelligence
- YARA
- SecLists
- OSX and iOS Security
- Industrial Control System Security
- InfoSec
- The Art of Hacking Series
- Bug Bounty - ups.
- Red Teaming
- Web Hacking
- Cyber Skills
- Exploit Development
- Fuzzing
- IoT Hacks
- Sec Talks
- Reinforcement Learning for Cyber Security
- Windows Exploitation - Advanced
- Capsulecorp Pentest
- Mainframe Hacking
- Real-time Communications hacking & pentesting resources
- Static Analysis
- Serverless Security
- Social Engineering
- Vulnerability Research
- Reversing
-
π οΈ Helpful Repositories
- Cryptography
- Free Programming Books
- Shell
- Web Security
- Machine Learning for Cyber Security
- Hacker101
- PayloadsAllTheThings
- API Security Checklist
- Adversarial Machine Learning
- Pentest Wiki
- Detection Lab
- Payloads
- Pentest Cheatsheets
- Forensics
- IOC
- CVE PoC
- Infosec Reference
- Probable Wordlists
- CVE PoC updated daily
- Linux Kernel Exploitation
- APT Notes
- Bug Bounty Reference - ups categorized by bug type from bug bounty programs.
- CTF Tool
- Infosec Getting Started
- Resource List
- Reverse Engineering
- RFSec-ToolKit
- Security Cheatsheets
- Security List
- Lockpicking
- AI Security
- Gray Hacker Resources
- ThreatHunter-Playbook
-
π§ Linux Penetration Testing OS
- Kali Linux - leading Linux distribution for penetration testing and ethical hacking, developed by Offensive Security
- BlackArch - based penetration testing distribution, designed for compatibility with Arch installations
- Parrot Security OS - based OS featuring a complete portable lab for security testing, digital forensics, and development
- LionSec Linux - based operating system tailored for penetration testing and security assessments
- Android Tamer
- Pentoo - based Linux distribution focused on penetration testing and security auditing
- Docker for Pentest
- Bugtraq
- BackBox - driven Linux distribution geared towards securing IT environments
-
π Reverse Engineering, Buffer Overflow, and Exploit Development
- Corelan Tutorials
- Introduction to ARM Assembly Basics
- Reverse Engineering Challenges
- Analysis and Exploitation (Unprivileged)
- Binary Hacking
- Linux (x86) Exploit Development Series
- Megabeets Journey into Radare2
- Recon.cx - Reversing Conference
- Reverse Engineering Malware 101
- Reverse Engineering Malware 102 - up course to "Reverse Engineering Malware 101".
- Reverse Engineering Reading List
- Shellcode Injection
- Modern Binary Exploitation - CSCI 4968
- A Course on Intermediate Level Linux Exploitation
- Reverse Engineering for Beginners (GitHub Project)
- flAWS Challenge
- Exploit Tutorials
- Reversing.kr Challenges
- Shell Storm - style collection of reverse engineering information.
- Exploit Tutorials
- Micro Corruption β Assembly
- Buffer Overflow Exploitation Megaprimer for Linux
- Exploit Development
- Introductory Intel x86
-
π Elevating Privileges
- Basic Linux Privilege Escalation
- GTFOBins
- Windows Privilege Escalation Checker
- Common Windows Privilege Escalation Vectors
- Privilege Escalation for Windows and Linux
- Reach the Root
- Windows Privilege Escalation
- Windows Privilege Escalation
- Windows Privilege Escalation Methods for Pentesters
- Windows Privilege Escalation Awesome Scripts
- Editing /etc/passwd File for Privilege Escalation
- Linux Privilege Escalation Using PATH Variable
- Linux Privilege Escalation using Misconfigured NFS
- LinEnum
- Linux Privilege Escalation Check Script
- Windows Exploit Suggester
- Watson
- Linux Smart Enumeration
- Windows Exploits, Mostly Precompiled
- AutoLocalPrivilegeEscalation - DB.
- RootHelper
- A Guide to Linux Privilege Escalation
- Linux Exploit Suggester
- Linux Privilege Escalation Scripts
- Privilege Escalation in Linux with Live Example
- Abusing SUDO (Linux Privilege Escalation)
- 4 Ways to Get Linux Privilege Escalation
- Local Linux Enumeration & Privilege Escalation Cheatsheet
-
π‘ Network Scanning / Reconnaissance
- Shodan - connected devices, providing detailed information about device vulnerabilities.
- Metasploit
- Maltego
- Zenmap - friendly and accessible.
- Google Dorks/Google Hacking
- Netcat
- SpiderFoot
- Recon-ng - source reconnaissance framework designed for advanced network reconnaissance.
- theHarvester
- Amass - source tool for network mapping of attack surfaces and external asset discovery using passive information gathering and active reconnaissance techniques.
- Foot Printing with WhoIS/DNS records
- Nmap
- Foot Printing with WhoIS/DNS records
-
π Online Communities
- Null Byte - focused on ethical hacking and cybersecurity tutorials, articles, and discussions
- Exploit Database Forum
- Reddit /r/hacking
- Hacktoday
- Stack Overflow Security - related questions and discussions
- MPGH - related hacks and cheats
- HackerOne Community
- Hack+ Telegram Channel
-
π° Cybersecurity News
- Threatpost
- The Hacker News
- The Daily Swig
- Recent Hash Leaks
- Security Intelligence - depth coverage of cybersecurity news and intelligence resources.
- Secjuice
- Don Does 30 - tester posting brief screenshot videos regularly.
- Error 404 Cyber News - weekly updates.
- DEFCON Conference - style videos from the iconic DEFCON.
- Geeks Fort - KIF
- HACKING TUTORIALS
- iExplo1t
- InfoSec Magazine
- JackkTutorials - length instructional videos with some "Ask Me" videos.
- John Hammond
- Latest Hacking News - length screenshot videos, no recent releases.
- LionSec
- Metasploitation
- NetSecNow
- Open SecurityTraining - style videos, no recent posts, but quality information.
- Pentester Academy TV
- rwbnetsec - length instructional videos covering tools from Kali 2.0, no recent posts.
- Samy Kamkar's Applied Hacking - length instructional videos from the creator of PoisonTap for the Raspberry Pi Zero, no recent content.
- SecureNinjaTV
- Security Weekly - style interviews with industry professionals.
- Seytonic
- Shozab Haxor - style instructional videos, regular updates, Windows CLI tutorials.
- SSTec Tutorials
- Tradecraft Security Weekly
- Troy Hunt - length news videos from a lone YouTuber, regular content.
- Waleed Jutt
- webpwnized
- Zer0Mem0ry
-
π‘οΈ Malware Analysis
- REMnux - engineering and analyzing malware
- Malware Analysis - CSCI 4976
- Malware Unicorn - Workshops
- Honeynet Project
- Bad Binaries
- Malware Analysis Tutorials - by-step tutorials on malware analysis by MalwareTech
- Zero2Automated
- Malware Analysis For Hedgehogs
- Practical Malware Analysis & Triage - on labs and examples
- Analyze Malware Using Volatility
- Malware Traffic Analysis
-
π Cybersecurity Education & Practical Labs
- Ctftime - to website for all things related to CTFs.
- Hacker101 CTF
- TryHackMe
- CTF365 - based CTF platform recognized by institutions like Kaspersky, MIT, and T-Mobile.
- Backdoor
- Hack.me
- CTFLearn - based CTF site offering challenges across various categories.
- Root-me
- Vulnhub
- PentesterLab
- PortSwigger
- Defend the Web
- Google's XSS game
- Cybrary - style website with a plethora of user-contributed content. Requires an account. Content can be filtered by experience level.
- Exploit exercises
- Hackthissite
- Free Cyber Security Training
- Seed Labs - on learning of cybersecurity concepts.
- Crackmes.one
- CTFs write-ups - ups from various CTFs, categorized by event.
- The enigma group
- Google CTF 2019
- Hacker Gateway
- knock.xss.moe
- Pentest Practice - based Pentest practice.
- PicoCTF
- ROP Emporium
- Solve Me - based platform requiring an account.
- websec.fr
- noe.systems
- Attack Defense
- PicoCTF
- Penetration Testing Practice Lab / Vulnerable Apps/Systems
- Hopper's Roppers Security Training - paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp to help beginners build a strong foundational knowledge base.
- Google CTF
- Upload-Labs
- Windows / Linux Local Privilege Escalation Workshop
- Academy Virtual Cyber Labs - on learning.
- arcX
- Hacksplaining
- Offensive Computer Security - semester academic course including 27 lecture videos with slides and assigned readings.
- Itsecgames
- Dvwa
- pwnable.kr
- CyberSec WTF - ups.
- Challenge Land
- Hacker test - friendly site for testing hacking skills.
- Participating Challenge Sites
- Pentest.training
- Shellter Labs - based infosec labs.
- VulHub
- Vulapps
- Snyk Vulnerability DB
- Pentestit - based CTF site requiring users to install OpenVPN.
- Ringzer0 Team - based CTF site hosting over 272 challenges.
- hackburger.ee
- CS 642: Intro to Computer Security
- webhacking.kr
- Hak5 - style videos covering a variety of topics. Includes a forum and the "Metasploit Minute" video series.
- HackTheBox
- Mind Maps - related mind maps.
- OWASP Top 10 Web Security Risks
- Overthewire
- SmashTheStack
- SecurityTube
-
π€ Conferences
- InfoCon.org
- Irongeek
- infocondb.org - referencing information from hacker conferences globally. It provides a centralized platform for exploring details about past and upcoming conferences, including speakers, topics, and event histories.
- Hunting for Top Bounties - Nicolas GrΓ©goire
- BSidesSF 101 The Tales of a Bug Bounty Hunter - Arne Swinnen
- Security Fest 2016 The Secret life of a Bug Bounty Hunter - Frans RosΓ©n
- The Conscience of a Hacker
- x33fcon Conference
- Hack In Paris
- LeHack / HZV
- Hack In The Box Security Conference - style instructional talks from an international security conference.
- Defcon Conference
-
π» Hacking and Security Forums
- 0x00sec
- CODEBY.NET - based forum covering hacking, web application penetration testing (WAPT), malware analysis, computer engineering, reverse engineering, and forensics.
- Hackforums
- CaveiraTech - based forum covering general hacking and cybersecurity discussions.
- Hack This Site
- Government Security
- Antichat - based forum discussing various aspects of hacking and cybersecurity.
- EAST Exploit Database
- sla.ckers.org
- Ethical Hacker Network
- Security Override
- iExploit
- Bright Shadows
- intern0t
- Bright Shadows
- intern0t
- Greysec
- BackTrack Linux Forums
- Elite Hackers
- iExploit
- 4Hat Day - based forum focusing on hacking and cybersecurity topics.
-
πΈοΈ Vulnerable Web Applications
-
π Blogs
- Skeptikal
- PreachSecurity
- XS-Sniper
- Exploit.co.il
- Nullthreat
- Question Defense
- Security Ninja
- ScriptKidd1e
- Ch3rn0byl
- TechExams
- Gnucitizen
- Sipvicious
- C22
- TSSCI Security
- Laramies
- Andlabs
- WepMa
- Mad Irish
- Sir Dark Cat
- Myne-us
- SpiderLabs
- PaulDotCom
- Attack Vector
- Deviating
- AlphaOne Labs
- Smashing Passwords
- ArchangelAmael
- Sickness
- Punter-Infosec - Infosec. |
- Security and Risk
- Esploit
- Pentestit
- Sipvicious
- Ch3rn0byl
- Esploit
- Common Exploits
- Spylogic
- GDS Security
- GDS Security
- Gynvael Coldwind
- GDS Security
- Security Sift
- McGrew Security
- Darknet
- Taosecurity
- Room362
- PortSwigger
- Pentest Monkey
- Jeremiah Grossman
- i8jesus
- C22
- Metasploit
- Darkoperator
- GDS Security
- WebSec
- Bernardo Damele
- Sensepost
- Security Reliks
- Reusable Security
- NotSoSecure
- Corelan
- WireWatcher
- Memset
- Hacking and Security
- Carnal0wnage
- Gnucitizen
- SkullSecurity
- Spylogic (again)
- Mad Irish
- Digininja
-
π Credit To All Below
- fsociety
- Movies for Hackers
- Free Security E-Books - books covering diverse topics in cybersecurity. π
- Hacker Roadmap
- Awesome Hacking
- Hacking Tool
- Cheatsheet God
-
βΉοΈ Contributing
-
πΊ YouTube Channels
- Murmus CTF - Weekly live streamings
- OJ Reeves
- Hacksplained - A Beginner Friendly Guide to Hacking - friendly hacking guides and tutorials.
- The Hated one - related content.
- Hak5
- LiveOverflow - Explore weird machines...
- GynvaelEN - Podcasts about CTFs, computer security, programming and similar things.
- Murmus CTF - Weekly live streamings
- PwnFunction
- Hackersploit
- Hackerone
- BlackHat
-
π΅οΈββοΈ Hacking Google Series
Programming Languages
Categories
π Blogs
70
π Cybersecurity Education & Practical Labs
65
π Valuable Repositories
45
π° Cybersecurity News
33
π οΈ Helpful Repositories
33
π Elevating Privileges
28
π Reverse Engineering, Buffer Overflow, and Exploit Development
24
π» Hacking and Security Forums
21
πΈοΈ Vulnerable Web Applications
16
π‘ Network Scanning / Reconnaissance
13
π€ Conferences
12
πΊ YouTube Channels
12
π‘οΈ Malware Analysis
11
π§ Linux Penetration Testing OS
9
π Online Communities
8
π΅οΈββοΈ Hacking Google Series
7
π Credit To All Below
7
βΉοΈ Contributing
1
Sub Categories
Keywords
security
27
awesome
25
awesome-list
24
hacking
19
penetration-testing
11
list
9
pentesting
7
infosec
7
privilege-escalation
6
pentest
6
exploit
5
osint
5
cybersecurity
5
vulnerability
5
information-gathering
4
ctf
4
owasp
4
recon
4
threat-intelligence
3
iot
3
redteam
3
bash
3
vulnerabilities
3
fuzzing
3
dfir
3
enumeration
3
information-security
3
python
3
awesome-lists
3
reverse-engineering
2
osx
2
threatintel
2
osint-reconnaissance
2
oscp
2
cve
2
hackthebox
2
learning
2
hardware
2
security-tools
2
appsec
2
cyber-security
2
exploitation
2
ansible
2
linux
2
cheatsheet
2
red-team
2
sdr
2
windows
2
education
2
xss
2