Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
https://github.com/NetanMangal/Awesome-Hacking
Last synced: about 13 hours ago
JSON representation
-
Awesome Repositories
- Asset Discovery
- Bug Bounty - ups from the Bug Bounty hunters
- Cyber Skills
- DevSecOps
- Exploit Development
- Fuzzing
- Hacking Resources
- Industrial Control System Security
- InfoSec
- IoT Hacks
- Mainframe Hacking
- OSINT
- OSX and iOS Security
- Pentest
- Red Teaming
- Sec Talks
- SecLists
- Threat Intelligence
- Web Hacking
- Windows Exploitation - Advanced
- WiFi Arsenal
- YARA
- Hacker Roadmap
- Android Security
- AppSec
- CTF
- Embedded and IoT Security
- Hacking
- Honeypots
- Incident Response
- Malware Analysis
- Pcaptools
- PHP Security
- Security
- Vehicle Security
- Static Analysis
- Reversing
- Serverless Security
- Social Engineering
- Vulnerability Research
-
Other useful repositories
- Adversarial Machine Learning
- API Security Checklist
- APT Notes
- Bug Bounty Reference - up that is categorized by the bug nature
- CTF Tool
- CVE PoC
- Detection Lab
- Forensics
- Hacker101
- Infosec Getting Started
- Infosec Reference
- IOC
- Linux Kernel Exploitation
- Machine Learning for Cyber Security
- Payloads
- PayloadsAllTheThings
- Pentest Cheatsheets
- Pentest Wiki
- Probable Wordlists
- Resource List
- Reverse Engineering
- RFSec-ToolKit
- Security Cheatsheets
- Security List
- Shell - line frameworks, toolkits, guides and gizmos to make complete use of shell
- Web Security
- Cryptography
- Free Programming Books
- ThreatHunter-Playbook
- Gray Hacker Resources
- Lockpicking
- AI Security
-
Need more ?
Sub Categories
Keywords
awesome
24
security
23
awesome-list
21
hacking
12
penetration-testing
9
list
8
infosec
6
pentest
6
pentesting
4
privilege-escalation
4
owasp
3
reverse-engineering
3
iot
3
cybersecurity
3
web-security
3
dfir
3
vulnerability
3
ctf
3
redteam
2
payloads
2
payload
2
ioc
2
post-exploitation
2
osx
2
malware-analysis
2
information-security
2
learning
2
appsec
2
malware-research
2
web-hacking
2
threat-intelligence
2
xss
2
bash
2
fuzzing
2
osint
2
cheatsheet
2
hardware
2
yara-rules
2
forensics
2
linux
2
education
2
exploit
2
vulnerabilities
2
cryptography
2
information-gathering
1
hacktools
1
detectionlab
1
detection
1
roadmap
1
ansible
1