Convert Figma logo to code with AI

Hack-with-Github logoAwesome-Hacking

A collection of various awesome lists for hackers, pentesters and security researchers

83,932
8,889
83,932
18

Top Related Projects

A collection of hacking / penetration testing resources to make you better!

A collection of awesome penetration testing resources, tools and other shiny things

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

🐶 A curated list of Web Security materials and resources.

A list of web application security

A curated list of awesome Hacking tutorials, tools and resources

Quick Overview

Awesome-Hacking is a curated list of hacking tools, resources, and references maintained by the Hack-with-Github community. It serves as a comprehensive collection of information for cybersecurity professionals, ethical hackers, and enthusiasts. The repository covers various aspects of hacking, including penetration testing, vulnerability assessment, and security research.

Pros

  • Extensive collection of resources covering multiple areas of cybersecurity
  • Regularly updated with new tools and information
  • Well-organized structure makes it easy to find specific topics
  • Community-driven project with contributions from various experts

Cons

  • May overwhelm beginners due to the vast amount of information
  • Some links may become outdated over time
  • Lacks detailed explanations or tutorials for using the listed tools
  • Potential for misuse if not used responsibly and ethically

Note: As this is not a code library, the code example and quick start sections have been omitted.

Competitor Comparisons

A collection of hacking / penetration testing resources to make you better!

Pros of Awesome-Hacking-Resources

  • More detailed categorization of resources, making it easier to find specific topics
  • Includes a section on careers in cybersecurity, providing guidance for those interested in the field
  • Offers a more comprehensive list of online courses and certifications

Cons of Awesome-Hacking-Resources

  • Less frequently updated compared to Awesome-Hacking
  • Fewer contributors, potentially limiting the diversity of resources
  • Some categories have fewer entries, which may not cover all aspects of certain topics

Code Comparison

While both repositories primarily consist of curated lists rather than code, they differ in their organization. Here's a comparison of their main README.md structure:

Awesome-Hacking:

## Table of Contents
- [Awesome lists](#awesome-lists)
- [Penetration testing](#penetration-testing)
- [Tools](#tools)

Awesome-Hacking-Resources:

### Table of Contents
1. [Online Resources](#online-resources)
2. [Tools](#tools)
3. [Talks](#talks)
4. [Conferences](#conferences)
5. [Careers](#careers)

Both repositories serve as valuable resources for cybersecurity enthusiasts and professionals. Awesome-Hacking offers a broader range of topics with more frequent updates, while Awesome-Hacking-Resources provides a more structured approach with additional focus on career development in the field.

A collection of awesome penetration testing resources, tools and other shiny things

Pros of awesome-pentest

  • More focused on penetration testing tools and resources
  • Better organized with clear categories and subcategories
  • Includes more detailed descriptions for many tools

Cons of awesome-pentest

  • Less frequently updated compared to Awesome-Hacking
  • Narrower scope, primarily focused on pentesting rather than broader hacking topics
  • Fewer contributors and stars on GitHub

Code Comparison

While both repositories are primarily curated lists of resources, they don't contain significant code. However, here's a comparison of their README structures:

awesome-pentest:

# Awesome Penetration Testing

- [Online Resources](#online-resources)
  - [Penetration Testing Resources](#penetration-testing-resources)
  - [Exploit Development](#exploit-development)

Awesome-Hacking:

# Awesome Hacking

A collection of awesome lists for hackers, pentesters & security researchers.

- [Awesome Hacking](#awesome-hacking)
    - [Awesome Repositories](#awesome-repositories)
    - [Awesome Sec Talks](#awesome-sec-talks)

Both repositories serve as valuable resources for security professionals, with Awesome-Hacking offering a broader range of topics and awesome-pentest providing a more focused, detailed approach to penetration testing resources.

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

Pros of awesome-security

  • More comprehensive coverage of general security topics, including network security, web security, and cryptography
  • Better organization with clear categories and subcategories
  • Includes educational resources and certifications for security professionals

Cons of awesome-security

  • Less focus on specific hacking tools and techniques
  • May not be as frequently updated as Awesome-Hacking
  • Fewer contributors and stars on GitHub

Code comparison

While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, here's an example of how they structure their lists:

awesome-security:

## Network

### Scanning / Pentesting

* [nmap](https://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits
* [pig](https://github.com/rafael-santiago/pig) - A Linux packet crafting tool

Awesome-Hacking:

### Network Hacking
* [Bettercap](https://github.com/bettercap/bettercap) - Framework to perform MITM (Man in the Middle) attacks.
* [WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) - Framework for Rogue Wi-Fi Access Point Attack.

Both repositories provide valuable resources for security professionals and enthusiasts. Awesome-Hacking focuses more on specific hacking tools and techniques, while awesome-security offers a broader overview of security topics and resources.

🐶 A curated list of Web Security materials and resources.

Pros of awesome-web-security

  • More focused and specialized content specifically for web security
  • Better organization with clear categories and subcategories
  • Includes practical tools and resources for web security testing

Cons of awesome-web-security

  • Limited scope compared to the broader hacking topics covered in Awesome-Hacking
  • May not be as frequently updated as Awesome-Hacking
  • Fewer contributors and stars, potentially indicating a smaller community

Code Comparison

While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, here's an example of how they structure their content:

awesome-web-security:

## SQL Injection
- [SQL Injection cheatsheet](https://github.com/sqlmapproject/sqlmap/wiki/SQL-Injection-Cheatsheet)
- [SQL Injection Payload List](https://github.com/payloadbox/sql-injection-payload-list)

Awesome-Hacking:

### SQL Injection
* [SQL Injection cheatsheet](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/)
* [SQL Injection Wiki](https://sqlwiki.netspi.com/)

Both repositories use similar Markdown formatting, but awesome-web-security tends to have more detailed categorization and subcategories for easier navigation.

A list of web application security

Pros of awesome-web-hacking

  • More focused on web-specific hacking tools and resources
  • Better organized with clear categories for different aspects of web hacking
  • Includes a section on practice labs and vulnerable applications for hands-on learning

Cons of awesome-web-hacking

  • Less comprehensive overall compared to Awesome-Hacking
  • Fewer contributors and updates, potentially leading to outdated information
  • Limited coverage of non-web hacking topics and general cybersecurity resources

Code comparison

While both repositories primarily consist of curated lists rather than code, here's a comparison of their README structures:

awesome-web-hacking:

# Awesome Web Hacking

- [Tools](#tools)
- [Vulnerability Scanners](#vulnerability-scanners)
- [Attacks](#attacks)

Awesome-Hacking:

# Awesome Hacking

- [Awesome Repositories](#awesome-repositories)
- [Awesome Websites](#awesome-websites)
- [Awesome Tools](#awesome-tools)

Both repositories use similar Markdown structures, but Awesome-Hacking has a broader scope with more diverse categories, while awesome-web-hacking focuses specifically on web hacking topics.

A curated list of awesome Hacking tutorials, tools and resources

Pros of awesome-hacking

  • More focused on specific hacking tools and techniques
  • Includes sections on mobile hacking and game hacking
  • Provides links to online hacking practice platforms

Cons of awesome-hacking

  • Less comprehensive overall compared to Awesome-Hacking
  • Not as frequently updated as Awesome-Hacking
  • Lacks some categories present in Awesome-Hacking (e.g., honeypots, forensics)

Code comparison

While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, they do use different markdown formatting styles:

awesome-hacking:

## Tools
* [Nmap](https://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits
* [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer

Awesome-Hacking:

### Network Hacking
- [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer.
- [Nmap](https://nmap.org/) - A free security scanner for network exploration & security audits.

Both repositories serve as valuable resources for ethical hacking and cybersecurity enthusiasts. Awesome-Hacking offers a more extensive collection of resources across various categories, while awesome-hacking provides a more focused approach on specific hacking techniques and tools. The choice between the two depends on the user's specific needs and interests in the field of ethical hacking.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Awesome Hacking

Awesome Hacking Tweet

A collection of awesome lists for hackers, pentesters & security researchers.

Your contributions are always welcome !

Awesome Repositories

RepositoryDescription
Android SecurityCollection of Android security related resources
AppSecResources for learning about application security
Asset DiscoveryList of resources which help during asset discovery phase of a security assessment engagement
Bug BountyList of Bug Bounty Programs and write-ups from the Bug Bounty hunters
Capsulecorp PentestVagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis
Celluar HackingThis is a list of hacking research in the 3G/4G/5G cellular security space.
CTFList of CTF frameworks, libraries, resources and softwares
Cyber SkillsCurated list of hacking environments where you can train your cyber skills legally and safely
DevSecOpsList of awesome DevSecOps tools with the help from community experiments and contributions
Embedded and IoT SecurityA curated list of awesome resources about embedded and IoT security
Exploit DevelopmentResources for learning about Exploit Development
FuzzingList of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis
HackingList of awesome Hacking tutorials, tools and resources
Hacking ResourcesCollection of hacking / penetration testing resources to make you better!
HoneypotsList of honeypot resources
Incident ResponseList of tools for incident response
Industrial Control System SecurityList of resources related to Industrial Control System (ICS) security
InfoSecList of awesome infosec courses and training resources
IoT HacksCollection of Hacks in IoT Space
Mainframe HackingList of Awesome Mainframe Hacking/Pentesting Resources
Malware AnalysisList of awesome malware analysis tools and resources
OSINTList of amazingly awesome Open Source Intelligence (OSINT) tools and resources
OSX and iOS SecurityOSX and iOS related security tools
PcaptoolsCollection of tools developed by researchers in the Computer Science area to process network traces
PentestList of awesome penetration testing resources, tools and other shiny things
PHP SecurityLibraries for generating secure random numbers, encrypting data and scanning for vulnerabilities
Real-time Communications hacking & pentesting resourcesCovers VoIP, WebRTC and VoLTE security related topics
Red TeamingList of Awesome Red Team / Red Teaming Resources
ReversingList of awesome reverse engineering resources
Reinforcement Learning for Cyber SecurityList of awesome reinforcement learning for security resources
Sec TalksList of awesome security talks
SecListsCollection of multiple types of lists used during security assessments
SecurityCollection of awesome software, libraries, documents, books, resources and cools stuffs about security
Serverless SecurityCollection of Serverless security related resources
Social EngineeringList of awesome social engineering resources
Static AnalysisList of static analysis tools, linters and code quality checkers for various programming languages
The Art of Hacking SeriesList of resources includes thousands of cybersecurity-related references and resources
Threat IntelligenceList of Awesome Threat Intelligence resources
Vehicle SecurityList of resources for learning about vehicle security and car hacking
Vulnerability ResearchList of resources about Vulnerability Research
Web HackingList of web application security
Web3 SecurityA curated list of web3 Security materials and resources For Pentesters and Bug Hunters.
Windows Exploitation - AdvancedList of Awesome Advanced Windows Exploitation References
WiFi ArsenalPack of various useful/useless tools for 802.11 hacking
YARAList of awesome YARA rules, tools, and people
Hacker RoadmapA guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking.

Other Useful Repositories

RepositoryDescription
Adversarial Machine LearningCurated list of awesome adversarial machine learning resources
AI SecurityCurated list of AI security resources
API Security ChecklistChecklist of the most important security countermeasures when designing, testing, and releasing your API
APT NotesVarious public documents, whitepapers and articles about APT campaigns
Bug Bounty ReferenceList of bug bounty write-up that is categorized by the bug nature
CryptographyCryptography resources and tools
CTF ToolList of Capture The Flag (CTF) frameworks, libraries, resources and softwares
CVE PoCList of CVE Proof of Concepts (PoCs)
CVE PoC updated dailyList of CVE Proof of Concepts (PoCs) updated daily by Trickest
CyberChefA simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages.
Detection LabVagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
ForensicsList of awesome forensic analysis tools and resources
Free Programming BooksFree programming books for developers
Gray Hacker ResourcesUseful for CTFs, wargames, pentesting
GTFOBinsA curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions
Hacker101A free class for web security by HackerOne
Infosec Getting StartedA collection of resources, documentation, links, etc to help people learn about Infosec
Infosec ReferenceInformation Security Reference That Doesn't Suck
IOCCollection of sources of indicators of compromise
Linux Kernel ExploitationA bunch of links related to Linux kernel fuzzing and exploitation
LockpickingResources relating to the security and compromise of locks, safes, and keys.
Machine Learning for Cyber SecurityCurated list of tools and resources related to the use of machine learning for cyber security
PayloadsCollection of web attack payloads
PayloadsAllTheThingsList of useful payloads and bypass for Web Application Security and Pentest/CTF
Pentest CheatsheetsCollection of the cheat sheets useful for pentesting
Pentest WikiA free online security knowledge library for pentesters / researchers
Probable WordlistsWordlists sorted by probability originally created for password generation and testing
Resource ListCollection of useful GitHub projects loosely categorised
Reverse EngineeringList of Reverse Engineering articles, books, and papers
RFSec-ToolKitCollection of Radio Frequency Communication Protocol Hacktools
Security CheatsheetsCollection of cheatsheets for various infosec tools and topics
Security ListGreat security list for fun and profit
ShellList of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell
ThreatHunter-PlaybookA Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns
Web SecurityCurated list of Web Security materials and resources
VulhubPre-Built Vulnerable Environments Based on Docker-Compose

Need More ?

Follow Hack with GitHub on your favorite social media to get daily updates on interesting GitHub repositories related to Security.

Contributions

Please have a look at contributing.md