New Free WhatsApp Business API Platform — Try Free
2
Categories
54
Resources

Awesome Repositories

Android Security

Bug Bounty & CTF

  • Bug Bounty

    List of Bug Bounty Programs and write-ups from the Bug Bounty hunters

  • CTF

    List of CTF frameworks, libraries, resources and softwares

  • Cyber Skills

    Curated list of hacking environments where you can train your cyber skills legally and safely

  • Capsulecorp Pentest

    Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis

Mobile & IoT Security

Penetration Testing

  • Pentest

    List of awesome penetration testing resources, tools and other shiny things

  • Hacking

    List of awesome Hacking tutorials, tools and resources

  • Hacking Resources

    Collection of hacking / penetration testing resources to make you better!

  • Mainframe Hacking

    List of Awesome Mainframe Hacking/Pentesting Resources

Security Analysis

  • Malware Analysis

    List of awesome malware analysis tools and resources

  • Reversing

    List of awesome reverse engineering resources

  • Static Analysis

    List of static analysis tools, linters and code quality checkers for various programming languages

  • Fuzzing

    List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development

Incident Response & Forensics

Specialized Security

Other Useful Repositories

AI & Machine Learning Security

Web Security & APIs

  • Web Hacking

    List of web application security

  • Web Security

    Curated list of Web Security materials and resources

  • API Security Checklist

    Checklist of the most important security countermeasures when designing, testing, and releasing your API

  • Web3 Security

    A curated list of web3 Security materials and resources For Pentesters and Bug Hunters

Cryptography & Encryption

  • Cryptography

    Cryptography resources and tools

  • YARA

    List of awesome YARA rules, tools, and people

  • Lockpicking

    Resources relating to the security and compromise of locks, safes, and keys

Exploitation & Red Teaming

Tools & Utilities

  • CyberChef

    A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages

  • GTFOBins

    A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions

  • SecLists

    Collection of multiple types of lists used during security assessments

  • PayloadsAllTheThings

    List of useful payloads and bypass for Web Application Security and Pentest/CTF

Learning & Training

Specialized Tools

  • Detection Lab

    Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices

  • Vulhub

    Pre-Built Vulnerable Environments Based on Docker-Compose

  • RFSec-ToolKit

    Collection of Radio Frequency Communication Protocol Hacktools

  • WiFi Arsenal

    Pack of various useful/useless tools for 802.11 hacking