Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
https://github.com/NetanMangal/Awesome-Hacking
Last synced: 3 days ago
JSON representation
-
Awesome Repositories
- Asset Discovery
- Bug Bounty - ups from the Bug Bounty hunters
- Cyber Skills
- DevSecOps
- Exploit Development
- Fuzzing
- Hacking Resources
- Industrial Control System Security
- InfoSec
- IoT Hacks
- Mainframe Hacking
- OSINT
- OSX and iOS Security
- Pentest
- Red Teaming
- Reversing
- Sec Talks
- SecLists
- Threat Intelligence
- Web Hacking
- Windows Exploitation - Advanced
- WiFi Arsenal
- YARA
- Hacker Roadmap
- Android Security
- AppSec
- CTF
- Embedded and IoT Security
- Hacking
- Honeypots
- Incident Response
- Malware Analysis
- Pcaptools
- PHP Security
- Security
- Vehicle Security
- Static Analysis
-
Other useful repositories
- Adversarial Machine Learning
- API Security Checklist
- APT Notes
- Bug Bounty Reference - up that is categorized by the bug nature
- CTF Tool
- CVE PoC
- Detection Lab
- Forensics
- Hacker101
- Infosec Getting Started
- Infosec Reference
- IOC
- Linux Kernel Exploitation
- Machine Learning for Cyber Security
- Payloads
- PayloadsAllTheThings
- Pentest Cheatsheets
- Pentest Wiki
- Probable Wordlists
- Resource List
- Reverse Engineering
- RFSec-ToolKit
- Security Cheatsheets
- Security List
- Shell - line frameworks, toolkits, guides and gizmos to make complete use of shell
- Web Security
- Cryptography
- Free Programming Books
- Gray Hacker Resources
- Lockpicking
-
Need more ?
Sub Categories
Keywords
awesome
24
security
23
awesome-list
21
hacking
11
list
8
penetration-testing
8
pentest
6
infosec
5
privilege-escalation
4
vulnerability
3
iot
3
cybersecurity
3
owasp
3
dfir
3
pentesting
3
osx
2
information-security
2
osint
2
web-hacking
2
web-security
2
bash
2
appsec
2
education
2
ioc
2
xss
2
malware-analysis
2
cheatsheet
2
yara-rules
2
malware-research
2
reverse-engineering
2
hardware
2
threat-intelligence
2
fuzzing
2
payloads
2
redteam
2
learning
2
payload
2
exploit
2
ctf
2
oauth2
1
cve
1
poc
1
jwt
1
api
1
roadmap
1
post-exploitation
1
information-gathering
1
hacktools
1
hacking-tool
1
mobile-security
1