An open API service indexing awesome lists of open source software.

https://github.com/InfosecHouse/InfosecHouse

Tools & Resources for Cyber Security Operations
https://github.com/InfosecHouse/InfosecHouse

bugbounty bugbounty-tool defensive-security hacking incident-response infosec infosec-reference infosectools offensive-security penetration-testing-tools pentest-tools resources

Last synced: 16 days ago
JSON representation

Tools & Resources for Cyber Security Operations

Awesome Lists containing this project

README

        

---
label: Home
icon: home
meta:
title: "Infosec House"
---

![](/assets/headers/infosechouse-header.png)







Enhance your cyber security operations with a comprehensive range of tools and resources for both offensive and defensive strategies.

If visiting us on GitHub please visit [https://infosec.house](https://infosec.house) for our website version of this repo. Much more search friendly!

Found a resources that should be on here? Feel free to submit a [Pull Request](https://github.com/InfosecHouse/InfosecHouse/pulls)!

Need to report a broken/incorrect link? Feel free to submit an [Issue](https://github.com/infosechouse/infosechouse/issues).

---

* [API](api.md) - Tools and resources for pentesting against API endpoints.
* [Asset Management](assets-management.md) - Keep track of your inventory. You can't protect what you don't see.

---

* [Blogs](blogs.md) - Reading material for offensive security researchers.
* [Bug Bounty](bug-bounty.md) - Test out your skills against other hackers. Get paid for finding vulnerabilities.

---

* [C2](C2.md) - Command and Control tools and frameworks.
* [Cheat Sheets](cheat-sheets.md) - Offensive security cheat sheets.
* [Cloud & Containers](cloud-containers.md) - Discover tools and resources dedicated to hacking cloud platforms.
* [Collaboration](collab.md) - Discover tools and frameworks for red team collaboration.
* [Cracking](cracking.md) - Everything you need to crack all the hashes.
* [Cryptography](cryptography.md) - How great is your cryptography?
* [CTF Offensive](ctf.md) - Compete your hacking skills against others.

---

* [Data Exfiltration](data-exfiltration.md) - Exfiltrate the data, and test your DLP.
* [Default Passwords](default-passwords.md) - 1,000+ default passwords.

---

* [E-Mail](e-mail.md) - E-Mail pentesting tools and resources.
* [Editors & Viewers](editor-viewer.md) - Tools for editing/viewing files.
* [Education](education.md) - Training and courses to master your craft.
* [Emulation](emulation.md) - Emulate the adversary.
* [Endpoint Protection](endpoint-protection.md) - Protect your endpoints.
* [Evasion](evasion.md) - Evade getting caught.
* [Exploits](exploits.md) - Gather all your exploits needed to pop that box.

---

* [Firewalls](firewalls.md) - Attack the castle doors.
* [Forensics](forensics.md) - Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.

---

* [Hardware](hardware.md) - Grab some of the most used hardware within the penetration testing industry.
* [Honeypots](honeypot.md) - Catch them with their hands/attacks sticky.

---

* [IDS/IPS](ids-ips.md) - Intrusion Detection and Prevention Systems.
* [Incident Response](ir.md) - Incident response tools, and resources when alarms pop off.

---

* [Linux](linux.md) - Tools and resources for popping those Linux boxes.

---

* [Malware](malware.md) - All the malware you can wish for to reverse engineer.
* [Mobile](mobile.md) - Tools and resources for pentesting on mobile applications.
* [Music](music.md) - Kick back relax and enjoy some entertainment.

---

* [Network](network.md) - Sniff the network. Modify the packets.

---

* [Operating Systems](operating-systems.md) - Operating systems for whatever task at hand.
* [Operation Security](opsec.md) - Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.
* [OSINT](osint.md) - Open-Source Intel. Get all the information needed for your target.

---

* [Privilege Escalation](privilege-escalation.md) - Understand your target. Perform in-depth research and discover new attack surfaces.

---

* [Reverse Engineering](re.md) - Reverse engineering tools both offensive and defensive operations can utilize.
* [Reconnaissance](recon.md) - Understand your target. Perform in-depth research and discover new attack surfaces.

---

* [Shells](shells.md) - Generating pre-built webshells to customizing your own.
* [Social Engineering](social-engineering.md) - Manipulation techniques that exploit human error to gain private information, access, or valuables.

---

* [Threat Intel](threat-intel.md) - Discover where the threats begin.

---

* [Video](videos.md) - Talks, livestreams, and presentations.
* [Vulnerability Scanners](vuln-scanners.md) - Discover vulnerabilities fast, and automate some of the heavy loads.

---

* [Web Application](web-app.md) - Break that web application.
* [Windows](windows.md) - Microsoft Windows pentesting tools and resources.
* [Wireless](windows.md) - Wireless pentesting tools and resources.