Awesome Hacking Overview
A collection of various awesome lists for hackers, pentesters and security researchers
🏠 Home · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor · 😺 Hack-with-Github/Awesome-Hacking · ⭐ 88K · 🏷️ Miscellaneous
Awesome Hacking (⭐88k) 
A collection of awesome lists for hackers, pentesters & security researchers.
Your contributions are always welcome !
Awesome Repositories
Repository | Description |
---|---|
Android Security (⭐8.3k) | Collection of Android security related resources |
AppSec (⭐6.4k) | Resources for learning about application security |
Asset Discovery (⭐2k) | List of resources which help during asset discovery phase of a security assessment engagement |
Bug Bounty (⭐4.7k) | List of Bug Bounty Programs and write-ups from the Bug Bounty hunters |
Capsulecorp Pentest (⭐856) | Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis |
Celluar Hacking (⭐3k) | This is a list of hacking research in the 3G/4G/5G cellular security space. |
CTF (⭐10k) | List of CTF frameworks, libraries, resources and softwares |
Cyber Skills (⭐3.8k) | Curated list of hacking environments where you can train your cyber skills legally and safely |
DevSecOps (⭐4.7k) | List of awesome DevSecOps tools with the help from community experiments and contributions |
Embedded and IoT Security (⭐1.9k) | A curated list of awesome resources about embedded and IoT security |
Exploit Development (⭐1.9k) | Resources for learning about Exploit Development |
Fuzzing (⭐5.4k) | List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis |
Hacking (⭐14k) | List of awesome Hacking tutorials, tools and resources |
Hacking Resources (⭐16k) | Collection of hacking / penetration testing resources to make you better! |
Honeypots (⭐8.8k) | List of honeypot resources |
Incident Response (⭐7.8k) | List of tools for incident response |
Industrial Control System Security (⭐1.7k) | List of resources related to Industrial Control System (ICS) security |
InfoSec (⭐5.3k) | List of awesome infosec courses and training resources |
IoT Hacks (⭐2.2k) | Collection of Hacks in IoT Space |
Mainframe Hacking (⭐428) | List of Awesome Mainframe Hacking/Pentesting Resources |
Malware Analysis (⭐12k) | List of awesome malware analysis tools and resources |
OSINT (⭐20k) | List of amazingly awesome Open Source Intelligence (OSINT) tools and resources |
OSX and iOS Security (⭐1.4k) | OSX and iOS related security tools |
Pcaptools (⭐3.2k) | Collection of tools developed by researchers in the Computer Science area to process network traces |
Pentest (⭐22k) | List of awesome penetration testing resources, tools and other shiny things |
PHP Security (⭐31k) | Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities |
Real-time Communications hacking & pentesting resources (⭐428) | Covers VoIP, WebRTC and VoLTE security related topics |
Red Teaming (⭐7k) | List of Awesome Red Team / Red Teaming Resources |
Reversing (⭐4.2k) | List of awesome reverse engineering resources |
Reinforcement Learning for Cyber Security (⭐798) | List of awesome reinforcement learning for security resources |
Sec Talks (⭐4.1k) | List of awesome security talks |
SecLists (⭐60k) | Collection of multiple types of lists used during security assessments |
Security (⭐13k) | Collection of awesome software, libraries, documents, books, resources and cools stuffs about security |
Serverless Security (⭐604) | Collection of Serverless security related resources |
Social Engineering (⭐2.8k) | List of awesome social engineering resources |
Static Analysis (⭐14k) | List of static analysis tools, linters and code quality checkers for various programming languages |
The Art of Hacking Series (⭐20k) | List of resources includes thousands of cybersecurity-related references and resources |
Threat Intelligence (⭐8.3k) | List of Awesome Threat Intelligence resources |
Vehicle Security (⭐3.3k) | List of resources for learning about vehicle security and car hacking |
Vulnerability Research (⭐1.2k) | List of resources about Vulnerability Research |
Web Hacking (⭐6k) | List of web application security |
Web3 Security (⭐1.3k) | A curated list of web3 Security materials and resources For Pentesters and Bug Hunters. |
Windows Exploitation - Advanced (⭐1.5k) | List of Awesome Advanced Windows Exploitation References |
WiFi Arsenal (⭐2k) | Pack of various useful/useless tools for 802.11 hacking |
YARA (⭐3.7k) | List of awesome YARA rules, tools, and people |
Hacker Roadmap (⭐14k) | A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking. |
Cybersources (⭐636) | A collection of all types of tools and resources for cybersecurity. |
Other Useful Repositories
Repository | Description |
---|---|
Adversarial Machine Learning (⭐1.8k) | Curated list of awesome adversarial machine learning resources |
AI Security (⭐1.4k) | Curated list of AI security resources |
API Security Checklist (⭐23k) | Checklist of the most important security countermeasures when designing, testing, and releasing your API |
APT Notes (⭐3.5k) | Various public documents, whitepapers and articles about APT campaigns |
Bug Bounty Reference (⭐3.8k) | List of bug bounty write-up that is categorized by the bug nature |
Cryptography (⭐6k) | Cryptography resources and tools |
CTF Tool (⭐258) | List of Capture The Flag (CTF) frameworks, libraries, resources and softwares |
CVE PoC (⭐3.4k) | List of CVE Proof of Concepts (PoCs) |
CVE PoC updated daily (⭐6.7k) | List of CVE Proof of Concepts (PoCs) updated daily by Trickest |
CyberChef | A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. |
Detection Lab (⭐4.7k) | Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices |
Forensics (⭐4.1k) | List of awesome forensic analysis tools and resources |
Free Programming Books (⭐348k) | Free programming books for developers |
Gray Hacker Resources (⭐169) | Useful for CTFs, wargames, pentesting |
GTFOBins | A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions |
Hacker101 (⭐14k) | A free class for web security by HackerOne |
Infosec Getting Started (⭐592) | A collection of resources, documentation, links, etc to help people learn about Infosec |
Infosec Reference (⭐5.6k) | Information Security Reference That Doesn't Suck |
IOC (⭐829) | Collection of sources of indicators of compromise |
Linux Kernel Exploitation (⭐5.7k) | A bunch of links related to Linux kernel fuzzing and exploitation |
Lockpicking (⭐1.5k) | Resources relating to the security and compromise of locks, safes, and keys. |
Machine Learning for Cyber Security (⭐7.4k) | Curated list of tools and resources related to the use of machine learning for cyber security |
Payloads (⭐3.7k) | Collection of web attack payloads |
PayloadsAllTheThings (⭐63k) | List of useful payloads and bypass for Web Application Security and Pentest/CTF |
Pentest Cheatsheets (⭐3.9k) | Collection of the cheat sheets useful for pentesting |
Pentest Wiki (⭐3.5k) | A free online security knowledge library for pentesters / researchers |
Probable Wordlists (⭐8.8k) | Wordlists sorted by probability originally created for password generation and testing |
Resource List (⭐340) | Collection of useful GitHub projects loosely categorised |
Reverse Engineering (⭐2.4k) | List of Reverse Engineering articles, books, and papers |
RFSec-ToolKit (⭐1.6k) | Collection of Radio Frequency Communication Protocol Hacktools |
Security Cheatsheets (⭐1.3k) | Collection of cheatsheets for various infosec tools and topics |
Security List (⭐1.8k) | Great security list for fun and profit |
Shell (⭐34k) | List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell |
ThreatHunter-Playbook (⭐4.1k) | A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns |
Web Security (⭐12k) | Curated list of Web Security materials and resources |
Vulhub (⭐18k) | Pre-Built Vulnerable Environments Based on Docker-Compose |
Need More ?
Follow Hack with GitHub on your favorite social media to get daily updates on interesting GitHub repositories related to Security.
- Twitter : @HackwithGithub
- Facebook : HackwithGithub
Contributions
Please have a look at contributing.md