Introduction

Build Status GitHub commit activity GitHub last commit GitHub repo size

A collection of awesome lists for hackers, pentesters & security researchers.

Source: https://github.com/Hack-with-Github/Awesome-Hacking

Awesome Repositories

RepositoryDescription
Android SecurityCollection of Android security related resources
AppSecResources for learning about application security
Asset DiscoveryList of resources which help during asset discovery phase of a security assessment engagement
Bug BountyList of Bug Bounty Programs and write-ups from the Bug Bounty hunters
CTFList of CTF frameworks, libraries, resources and softwares
Cyber SkillsCurated list of hacking environments where you can train your cyber skills legally and safely
DevSecOpsList of awesome DevSecOps tools with the help from community experiments and contributions
Exploit DevelopmentResources for learning about Exploit Development
FuzzingList of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis
HackingList of awesome Hacking tutorials, tools and resources
Hacking ResourcesCollection of hacking / penetration testing resources to make you better!
HoneypotsList of honeypot resources
Incident ResponseList of tools for incident response
Industrial Control System SecurityList of resources related to Industrial Control System (ICS) security
InfoSecList of awesome infosec courses and training resources
IoT HacksCollection of Hacks in IoT Space
Malware AnalysisList of awesome malware analysis tools and resources
OSINTList of amazingly awesome Open Source Intelligence (OSINT) tools and resources
OSX and iOS SecurityOSX and iOS related security tools
PcaptoolsCollection of tools developed by researchers in the Computer Science area to process network traces
PentestList of awesome penetration testing resources, tools and other shiny things
PHP SecurityLibraries for generating secure random numbers, encrypting data and scanning for vulnerabilities
Red TeamingList of Awesome Red Team / Red Teaming Resources
ReversingList of awesome reverse engineering resources
Sec TalksList of awesome security talks
SecListsCollection of multiple types of lists used during security assessments
SecurityCollection of awesome software, libraries, documents, books, resources and cools stuffs about security
Serverless SecurityCollection of Serverless security related resources
Social EngineeringList of awesome social engineering resources
Static AnalysisList of static analysis tools, linters and code quality checkers for various programming languages
Threat IntelligenceList of Awesome Threat Intelligence resources
Vehicle SecurityList of resources for learning about vehicle security and car hacking
Vulnerability ResearchList of resources about Vulnerability Research
Web HackingList of web application security
Windows Exploitation - AdvancedList of Awesome Advanced Windows Exploitation References
WiFi ArsenalPack of various useful/useless tools for 802.11 hacking
YARAList of awesome YARA rules, tools, and people
Hacker RoadmapA guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking.

Other useful repositories

RepositoryDescription
Adversarial Machine LearningCurated list of awesome adversarial machine learning resources
AI SecurityCurated list of AI security resources
API Security ChecklistChecklist of the most important security countermeasures when designing, testing, and releasing your API
APT NotesVarious public documents, whitepapers and articles about APT campaigns
Bug Bounty ReferenceList of bug bounty write-up that is categorized by the bug nature
CryptographyCryptography resources and tools
CTF ToolList of Capture The Flag (CTF) frameworks, libraries, resources and softwares
CVE PoCList of CVE Proof of Concepts (PoCs)
Detection LabVagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
ForensicsList of awesome forensic analysis tools and resources
Free Programming BooksFree programming books for developers
Gray Hacker ResourcesUseful for CTFs, wargames, pentesting
Hacker101A free class for web security by HackerOne
Infosec Getting StartedA collection of resources, documentation, links, etc to help people learn about Infosec
Infosec ReferenceInformation Security Reference That Doesn't Suck
IOCCollection of sources of indicators of compromise
Linux Kernel ExploitationA bunch of links related to Linux kernel fuzzing and exploitation
LockpickingResources relating to the security and compromise of locks, safes, and keys.
Machine Learning for Cyber SecurityCurated list of tools and resources related to the use of machine learning for cyber security
PayloadsCollection of web attack payloads
PayloadsAllTheThingsList of useful payloads and bypass for Web Application Security and Pentest/CTF
Pentest CheatsheetsCollection of the cheat sheets useful for pentesting
Pentest WikiA free online security knowledge library for pentesters / researchers
Probable WordlistsWordlists sorted by probability originally created for password generation and testing
Resource ListCollection of useful GitHub projects loosely categorised
Reverse EngineeringList of Reverse Engineering articles, books, and papers
RFSec-ToolKitCollection of Radio Frequency Communication Protocol Hacktools
Security CheatsheetsCollection of cheatsheets for various infosec tools and topics
Security ListGreat security list for fun and profit
ShellList of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell
ThreatHunter-PlaybookA Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns
Web SecurityCurated list of Web Security materials and resources

Placeholder for future data.

Dumping possible syntax here

var s = "JavaScript syntax highlighting";
alert(s);
s = "Python syntax highlighting"
print s
No language indicated, so no syntax highlighting. 
But let's throw in a <b>tag</b>.
TablesAreCool
col 3 isright-aligned$1600
col 2 iscentered$12
zebra stripesare neat$1

Example of MermaidJS

graph TD;
    A-->B;
    A-->C;
    B-->D;
    C-->D;