Awesome Hacking Overview
A collection of various awesome lists for hackers, pentesters and security researchers
🏠 Home · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor · 😺 Hack-with-Github/Awesome-Hacking · ⭐ 111K · 🏷️ Miscellaneous

Awesome Hacking (⭐111k) 
A collection of awesome lists for hackers, pentesters & security researchers.
Your contributions are always welcome !
Awesome Repositories
| Repository | Description |
|---|---|
| Android Security (⭐9.4k) | Collection of Android security related resources |
| AppSec (⭐6.9k) | Resources for learning about application security |
| Asset Discovery (⭐2.5k) | List of resources which help during asset discovery phase of a security assessment engagement |
| Bug Bounty (⭐5.6k) | List of Bug Bounty Programs and write-ups from the Bug Bounty hunters |
| Cellular Hacking (⭐3.7k) | This is a list of hacking research in the 3G/4G/5G cellular security space. |
| CI/CD Attacks (⭐581) | Offensive research of CI/CD systems and deployment processes |
| CTF (⭐11k) | List of CTF frameworks, libraries, resources and softwares |
| Cyber Security University (⭐2.9k) | Free educational resources that focus on learning cybersecurity by doing |
| Cyber Skills (⭐4.3k) | Curated list of hacking environments where you can train your cyber skills legally and safely |
| Cybersources (⭐2.1k) | A collection of all types of tools and resources for cybersecurity |
| Detection Engineering (⭐1.2k) | Resources for designing, building, and operating detective cybersecurity controls |
| DevSecOps (⭐5.4k) | List of awesome DevSecOps tools with the help from community experiments and contributions |
| Drone Hacking (⭐58) | List of Drone hacking tools and resources |
| Embedded and IoT Security (⭐2.3k) | A curated list of awesome resources about embedded and IoT security |
| Fuzzing (⭐5.8k) | List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis |
| Hacking (⭐16k) | List of awesome Hacking tutorials, tools and resources |
| Honeypots (⭐10k) | List of honeypot resources |
| Incident Response (⭐9k) | List of tools for incident response |
| Industrial Control System Security (⭐1.9k) | List of resources related to Industrial Control System (ICS) security |
| InfoSec (⭐5.6k) | List of awesome infosec courses and training resources |
| IoT and Hardware Security (⭐35) | Collection of tools, books, resources and software about IoT and hardware security |
| Mainframe Hacking (⭐484) | List of Awesome Mainframe Hacking/Pentesting Resources |
| Malware Analysis (⭐14k) | List of awesome malware analysis tools and resources |
| Malware Persistence (⭐277) | Techniques adversaries use to maintain system access across restarts |
| Node.js Security (⭐3k) | Curated list of tools, security incidents and other resources around Node.js security |
| OSINT (⭐26k) | List of amazingly awesome Open Source Intelligence (OSINT) tools and resources |
| OSX and iOS Security (⭐1.6k) | OSX and iOS related security tools |
| Password Cracking (⭐921) | Tools and resources for recovering passwords |
| Pcaptools (⭐3.4k) | Collection of tools developed by researchers in the Computer Science area to process network traces |
| Pentest (⭐26k) | List of awesome penetration testing resources, tools and other shiny things |
| PHP Security (⭐32k) | Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities |
| Prompt Injection (⭐464) | Prompt injection vulnerabilities targeting AI and LLM systems |
| Real-time Communications hacking & pentesting resources (⭐532) | Covers VoIP, WebRTC and VoLTE security related topics |
| Red Teaming Toolkit (⭐10k) | Cutting-edge open-source security tools (OST) for red teamers and threat hunters |
| Reinforcement Learning for Cyber Security (⭐1k) | List of awesome reinforcement learning for security resources |
| Reversing (⭐1.4k) | Collection of resources to learn Reverse Engineering from start |
| Sec Talks (⭐4.2k) | List of awesome security talks |
| SecLists (⭐70k) | Collection of multiple types of lists used during security assessments |
| Security (⭐14k) | Collection of awesome software, libraries, documents, books, resources and cools stuffs about security |
| Social Engineering (⭐3.9k) | List of awesome social engineering resources |
| Static Analysis (⭐14k) | List of static analysis tools, linters and code quality checkers for various programming languages |
| The Art of Hacking Series (⭐26k) | List of resources includes thousands of cybersecurity-related references and resources |
| Threat Intelligence (⭐10k) | List of Awesome Threat Intelligence resources |
| Vehicle Security (⭐4.2k) | List of resources for learning about vehicle security and car hacking |
| Web Hacking (⭐6.8k) | List of web application security |
| Web3 Security (⭐1.6k) | A curated list of web3 Security materials and resources For Pentesters and Bug Hunters. |
| YARA (⭐4.2k) | List of awesome YARA rules, tools, and people |
Other Useful Repositories
| Repository | Description |
|---|---|
| AI Security (⭐1.6k) | Curated list of AI security resources |
| Annual Security Reports (⭐1.1k) | Cybersecurity trends, insights, and challenges from annual reports |
| API Security Checklist (⭐23k) | Checklist of the most important security countermeasures when designing, testing, and releasing your API |
| APT Notes (⭐3.6k) | Various public documents, whitepapers and articles about APT campaigns |
| Bug Bounty Reference (⭐4.2k) | List of bug bounty write-up that is categorized by the bug nature |
| Capsulecorp Pentest (⭐976) | Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis |
| Cryptography (⭐6.9k) | Cryptography resources and tools |
| CVE PoC (⭐7.7k) | List of CVE Proof of Concepts (PoCs) updated daily by Trickest |
| CyberChef | A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. |
| Detection Lab (⭐4.9k) | Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices |
| Executable Packing (⭐1.6k) | Resources about executable packing and unpacking |
| Forensics (⭐5k) | List of awesome forensic analysis tools and resources |
| Free Programming Books (⭐386k) | Free programming books for developers |
| GTFOBins | A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions |
| Hacker101 (⭐14k) | A free class for web security by HackerOne |
| Infosec Getting Started (⭐612) | A collection of resources, documentation, links, etc to help people learn about Infosec |
| Infosec Reference (⭐5.9k) | Information Security Reference That Doesn't Suck |
| IOC (⭐967) | Collection of sources of indicators of compromise |
| Linux Kernel Exploitation (⭐6.4k) | A bunch of links related to Linux kernel fuzzing and exploitation |
| Machine Learning for Cyber Security (⭐8.5k) | Curated list of tools and resources related to the use of machine learning for cyber security |
| Payloads (⭐3.9k) | Collection of web attack payloads |
| PayloadsAllTheThings (⭐77k) | List of useful payloads and bypass for Web Application Security and Pentest/CTF |
| Pentest Wiki (⭐3.7k) | A free online security knowledge library for pentesters / researchers |
| Probable Wordlists (⭐9.2k) | Wordlists sorted by probability originally created for password generation and testing |
| Red Team Physical Tools (⭐570) | Curated list of tools for physical security, red teaming, and tactical covert entry |
| Reverse Engineering (⭐2.7k) | List of Reverse Engineering articles, books, and papers |
| RFSec-ToolKit (⭐1.7k) | Collection of Radio Frequency Communication Protocol Hacktools |
| Security Cheatsheets (⭐32k) | OWASP Cheat Sheet Series for application security |
| Shell (⭐37k) | List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell |
| Suricata (⭐223) | Suricata IDS/IPS and network security monitoring resources |
| ThreatHunter-Playbook (⭐4.5k) | A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns |
| Tor (⭐89) | Resources about the Tor network and anonymous communication |
| Vulhub (⭐21k) | Pre-Built Vulnerable Environments Based on Docker-Compose |
| Web Security (⭐13k) | Curated list of Web Security materials and resources |
Need More ?
Follow Hack with GitHub on your favorite social media to get daily updates on interesting GitHub repositories related to Security.
- Twitter : @HackwithGithub
- Facebook : HackwithGithub
Contributions
Please have a look at contributing.md