Hacking-Awesome
  
  
    Hacking-Awesome 
    https://github.com/spy86/Hacking-Awesome
  
        Last synced: 3 days ago 
        JSON representation
    
- 
            
Uncategorized
- 
                    
Uncategorized
- - List of Bug Bounty Programs and write-ups from the Bug Bounty hunters
 - - Curated list of hacking environments where you can train your cyber skills legally and safely
 - - List of awesome DevSecOps tools with the help from community experiments and contributions
 - - Resources for learning about Exploit Development
 - - List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis
 - - Collection of hacking / penetration testing resources to make you better!
 - - List of resources related to Industrial Control System (ICS) security
 - - List of awesome infosec courses and training resources
 - - Collection of Hacks in IoT Space
 - - List of amazingly awesome Open Source Intelligence (OSINT) tools and resources
 - - OSX and iOS related security tools
 - - List of awesome penetration testing resources, tools and other shiny things
 - - List of Awesome Red Team / Red Teaming Resources
 - - List of awesome security talks
 - - Collection of multiple types of lists used during security assessments
 - - List of awesome social engineering resources
 - - List of Awesome Threat Intelligence resources
 - - List of resources about Vulnerability Research
 - - List of web application security
 - - Pack of various useful/useless tools for 802.11 hacking
 - - List of awesome YARA rules, tools, and people
 - - Curated list of awesome adversarial machine learning resources
 - - Checklist of the most important security countermeasures when designing, testing, and releasing your API
 - - Various public documents, whitepapers and articles about APT campaigns
 - - List of bug bounty write-up that is categorized by the bug nature
 - - List of Capture The Flag (CTF) frameworks, libraries, resources and softwares
 - - List of CVE Proof of Concepts (PoCs)
 - - Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
 - - List of awesome forensic analysis tools and resources
 - - A free class for web security by HackerOne
 - - A collection of resources, documentation, links, etc to help people learn about Infosec
 - - Information Security Reference That Doesn't Suck
 - - Collection of sources of indicators of compromise
 - - A bunch of links related to Linux kernel fuzzing and exploitation
 - - Curated list of tools and resources related to the use of machine learning for cyber security
 - - Collection of web attack payloads
 - - List of useful payloads and bypass for Web Application Security and Pentest/CTF
 - - Collection of the cheat sheets useful for pentesting
 - - A free online security knowledge library for pentesters / researchers
 - - Wordlists sorted by probability originally created for password generation and testing
 - - Collection of useful GitHub projects loosely categorised
 - - List of Reverse Engineering articles, books, and papers
 - - Collection of Radio Frequency Communication Protocol Hacktools
 - - Collection of cheatsheets for various infosec tools and topics
 - - Great security list for fun and profit
 - - Resources for learning about application security
 - - Collection of Android security related resources
 - - List of CTF frameworks, libraries, resources and softwares
 - - List of awesome Hacking tutorials, tools and resources
 - - List of honeypot resources
 - - List of tools for incident response
 - - List of awesome malware analysis tools and resources
 - - Collection of tools developed by researchers in the Computer Science area to process network traces
 - - Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities
 - - Collection of awesome software, libraries, documents, books, resources and cools stuffs about security
 - - List of resources for learning about vehicle security and car hacking
 - - List of awesome Windows Exploitation resources and shiny things
 - - Cryptography resources and tools
 - - Free programming books for developers
 - - Useful for CTFs, wargames, pentesting
 - - Useful scripts related with malware
 - - List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell
 - - Curated list of Web Security materials and resources
 - - List of static analysis tools, linters and code quality checkers for various programming languages
 - - Resources relating to the security and compromise of locks, safes, and keys.
 - - List of awesome social engineering resources
 - - List of resources about Vulnerability Research
 - - Curated list of AI security resources
 - - A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns
 - - List of awesome reverse engineering resources
 
 
 - 
                    
 
            Categories
          
          
        
            Sub Categories
          
          
        
            Keywords
          
          
              
                awesome
                23
              
              
                awesome-list
                21
              
              
                security
                21
              
              
                hacking
                10
              
              
                list
                8
              
              
                penetration-testing
                7
              
              
                infosec
                5
              
              
                pentest
                5
              
              
                privilege-escalation
                4
              
              
                vulnerability
                3
              
              
                fuzzing
                3
              
              
                dfir
                3
              
              
                cybersecurity
                3
              
              
                owasp
                3
              
              
                static-analysis
                2
              
              
                pentesting
                2
              
              
                iot
                2
              
              
                osint
                2
              
              
                hardware
                2
              
              
                osx
                2
              
              
                information-security
                2
              
              
                appsec
                2
              
              
                payloads
                2
              
              
                redteam
                2
              
              
                payload
                2
              
              
                bash
                2
              
              
                reading-list
                2
              
              
                curated
                2
              
              
                education
                2
              
              
                yara-rules
                2
              
              
                web-security
                2
              
              
                learning
                2
              
              
                reverse-engineering
                2
              
              
                cheatsheet
                2
              
              
                ioc
                2
              
              
                xss
                2
              
              
                exploit
                2
              
              
                ctf
                2
              
              
                malware-analysis
                2
              
              
                threat-intelligence
                2
              
              
                malware-research
                2
              
              
                threat-hunting
                1
              
              
                yara
                1
              
              
                oauth2
                1
              
              
                yara-manager
                1
              
              
                jwt
                1
              
              
                api
                1
              
              
                yara-scanner
                1
              
              
                yara-signatures
                1
              
              
                hacker101
                1