https://github.com/InfosecHouse/InfosecHouse
Tools & Resources for Cyber Security Operations
https://github.com/InfosecHouse/InfosecHouse
bugbounty bugbounty-tool defensive-security hacking incident-response infosec infosec-reference infosectools offensive-security penetration-testing-tools pentest-tools resources
Last synced: 16 days ago
JSON representation
Tools & Resources for Cyber Security Operations
- Host: GitHub
- URL: https://github.com/InfosecHouse/InfosecHouse
- Owner: InfosecHouse
- Created: 2021-05-21T23:50:00.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-08-22T16:18:27.000Z (9 months ago)
- Last Synced: 2024-08-22T18:03:26.722Z (9 months ago)
- Topics: bugbounty, bugbounty-tool, defensive-security, hacking, incident-response, infosec, infosec-reference, infosectools, offensive-security, penetration-testing-tools, pentest-tools, resources
- Homepage: https://infosec.house/
- Size: 101 MB
- Stars: 192
- Watchers: 10
- Forks: 52
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Changelog: changelog.md
Awesome Lists containing this project
- awesome-rainmana - InfosecHouse/InfosecHouse - Tools & Resources for Cyber Security Operations (Others)
- awesome-hacking-lists - InfosecHouse/InfosecHouse - Tools & Resources for Cyber Security Operations (Others)
README
---
label: Home
icon: home
meta:
title: "Infosec House"
---
Enhance your cyber security operations with a comprehensive range of tools and resources for both offensive and defensive strategies.
If visiting us on GitHub please visit [https://infosec.house](https://infosec.house) for our website version of this repo. Much more search friendly!
Found a resources that should be on here? Feel free to submit a [Pull Request](https://github.com/InfosecHouse/InfosecHouse/pulls)!
Need to report a broken/incorrect link? Feel free to submit an [Issue](https://github.com/infosechouse/infosechouse/issues).
---
* [API](api.md) - Tools and resources for pentesting against API endpoints.
* [Asset Management](assets-management.md) - Keep track of your inventory. You can't protect what you don't see.---
* [Blogs](blogs.md) - Reading material for offensive security researchers.
* [Bug Bounty](bug-bounty.md) - Test out your skills against other hackers. Get paid for finding vulnerabilities.---
* [C2](C2.md) - Command and Control tools and frameworks.
* [Cheat Sheets](cheat-sheets.md) - Offensive security cheat sheets.
* [Cloud & Containers](cloud-containers.md) - Discover tools and resources dedicated to hacking cloud platforms.
* [Collaboration](collab.md) - Discover tools and frameworks for red team collaboration.
* [Cracking](cracking.md) - Everything you need to crack all the hashes.
* [Cryptography](cryptography.md) - How great is your cryptography?
* [CTF Offensive](ctf.md) - Compete your hacking skills against others.---
* [Data Exfiltration](data-exfiltration.md) - Exfiltrate the data, and test your DLP.
* [Default Passwords](default-passwords.md) - 1,000+ default passwords.---
* [E-Mail](e-mail.md) - E-Mail pentesting tools and resources.
* [Editors & Viewers](editor-viewer.md) - Tools for editing/viewing files.
* [Education](education.md) - Training and courses to master your craft.
* [Emulation](emulation.md) - Emulate the adversary.
* [Endpoint Protection](endpoint-protection.md) - Protect your endpoints.
* [Evasion](evasion.md) - Evade getting caught.
* [Exploits](exploits.md) - Gather all your exploits needed to pop that box.---
* [Firewalls](firewalls.md) - Attack the castle doors.
* [Forensics](forensics.md) - Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.---
* [Hardware](hardware.md) - Grab some of the most used hardware within the penetration testing industry.
* [Honeypots](honeypot.md) - Catch them with their hands/attacks sticky.---
* [IDS/IPS](ids-ips.md) - Intrusion Detection and Prevention Systems.
* [Incident Response](ir.md) - Incident response tools, and resources when alarms pop off.---
* [Linux](linux.md) - Tools and resources for popping those Linux boxes.
---
* [Malware](malware.md) - All the malware you can wish for to reverse engineer.
* [Mobile](mobile.md) - Tools and resources for pentesting on mobile applications.
* [Music](music.md) - Kick back relax and enjoy some entertainment.---
* [Network](network.md) - Sniff the network. Modify the packets.
---
* [Operating Systems](operating-systems.md) - Operating systems for whatever task at hand.
* [Operation Security](opsec.md) - Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.
* [OSINT](osint.md) - Open-Source Intel. Get all the information needed for your target.---
* [Privilege Escalation](privilege-escalation.md) - Understand your target. Perform in-depth research and discover new attack surfaces.
---
* [Reverse Engineering](re.md) - Reverse engineering tools both offensive and defensive operations can utilize.
* [Reconnaissance](recon.md) - Understand your target. Perform in-depth research and discover new attack surfaces.---
* [Shells](shells.md) - Generating pre-built webshells to customizing your own.
* [Social Engineering](social-engineering.md) - Manipulation techniques that exploit human error to gain private information, access, or valuables.---
* [Threat Intel](threat-intel.md) - Discover where the threats begin.
---
* [Video](videos.md) - Talks, livestreams, and presentations.
* [Vulnerability Scanners](vuln-scanners.md) - Discover vulnerabilities fast, and automate some of the heavy loads.---
* [Web Application](web-app.md) - Break that web application.
* [Windows](windows.md) - Microsoft Windows pentesting tools and resources.
* [Wireless](windows.md) - Wireless pentesting tools and resources.