Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Top Related Projects
A collection of hacking / penetration testing resources to make you better!
A collection of awesome penetration testing resources, tools and other shiny things
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
🐶 A curated list of Web Security materials and resources.
A list of web application security
A curated list of awesome Hacking tutorials, tools and resources
Quick Overview
Awesome-Hacking is a curated list of hacking tools, resources, and references maintained by the Hack-with-Github community. It serves as a comprehensive collection of information for cybersecurity professionals, ethical hackers, and enthusiasts. The repository covers various aspects of hacking, including penetration testing, vulnerability assessment, and security research.
Pros
- Extensive collection of resources covering multiple areas of cybersecurity
- Regularly updated with new tools and information
- Well-organized structure makes it easy to find specific topics
- Community-driven project with contributions from various experts
Cons
- May overwhelm beginners due to the vast amount of information
- Some links may become outdated over time
- Lacks detailed explanations or tutorials for using the listed tools
- Potential for misuse if not used responsibly and ethically
Note: As this is not a code library, the code example and quick start sections have been omitted.
Competitor Comparisons
A collection of hacking / penetration testing resources to make you better!
Pros of Awesome-Hacking-Resources
- More detailed categorization of resources, making it easier to find specific topics
- Includes a section on careers in cybersecurity, providing guidance for those interested in the field
- Offers a more comprehensive list of online courses and certifications
Cons of Awesome-Hacking-Resources
- Less frequently updated compared to Awesome-Hacking
- Fewer contributors, potentially limiting the diversity of resources
- Some categories have fewer entries, which may not cover all aspects of certain topics
Code Comparison
While both repositories primarily consist of curated lists rather than code, they differ in their organization. Here's a comparison of their main README.md structure:
Awesome-Hacking:
## Table of Contents
- [Awesome lists](#awesome-lists)
- [Penetration testing](#penetration-testing)
- [Tools](#tools)
Awesome-Hacking-Resources:
### Table of Contents
1. [Online Resources](#online-resources)
2. [Tools](#tools)
3. [Talks](#talks)
4. [Conferences](#conferences)
5. [Careers](#careers)
Both repositories serve as valuable resources for cybersecurity enthusiasts and professionals. Awesome-Hacking offers a broader range of topics with more frequent updates, while Awesome-Hacking-Resources provides a more structured approach with additional focus on career development in the field.
A collection of awesome penetration testing resources, tools and other shiny things
Pros of awesome-pentest
- More focused on penetration testing tools and resources
- Better organized with clear categories and subcategories
- Includes more detailed descriptions for many tools
Cons of awesome-pentest
- Less frequently updated compared to Awesome-Hacking
- Narrower scope, primarily focused on pentesting rather than broader hacking topics
- Fewer contributors and stars on GitHub
Code Comparison
While both repositories are primarily curated lists of resources, they don't contain significant code. However, here's a comparison of their README structures:
awesome-pentest:
# Awesome Penetration Testing
- [Online Resources](#online-resources)
- [Penetration Testing Resources](#penetration-testing-resources)
- [Exploit Development](#exploit-development)
Awesome-Hacking:
# Awesome Hacking
A collection of awesome lists for hackers, pentesters & security researchers.
- [Awesome Hacking](#awesome-hacking)
- [Awesome Repositories](#awesome-repositories)
- [Awesome Sec Talks](#awesome-sec-talks)
Both repositories serve as valuable resources for security professionals, with Awesome-Hacking offering a broader range of topics and awesome-pentest providing a more focused, detailed approach to penetration testing resources.
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Pros of awesome-security
- More comprehensive coverage of general security topics, including network security, web security, and cryptography
- Better organization with clear categories and subcategories
- Includes educational resources and certifications for security professionals
Cons of awesome-security
- Less focus on specific hacking tools and techniques
- May not be as frequently updated as Awesome-Hacking
- Fewer contributors and stars on GitHub
Code comparison
While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, here's an example of how they structure their lists:
awesome-security:
## Network
### Scanning / Pentesting
* [nmap](https://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits
* [pig](https://github.com/rafael-santiago/pig) - A Linux packet crafting tool
Awesome-Hacking:
### Network Hacking
* [Bettercap](https://github.com/bettercap/bettercap) - Framework to perform MITM (Man in the Middle) attacks.
* [WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) - Framework for Rogue Wi-Fi Access Point Attack.
Both repositories provide valuable resources for security professionals and enthusiasts. Awesome-Hacking focuses more on specific hacking tools and techniques, while awesome-security offers a broader overview of security topics and resources.
🐶 A curated list of Web Security materials and resources.
Pros of awesome-web-security
- More focused and specialized content specifically for web security
- Better organization with clear categories and subcategories
- Includes practical tools and resources for web security testing
Cons of awesome-web-security
- Limited scope compared to the broader hacking topics covered in Awesome-Hacking
- May not be as frequently updated as Awesome-Hacking
- Fewer contributors and stars, potentially indicating a smaller community
Code Comparison
While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, here's an example of how they structure their content:
awesome-web-security:
## SQL Injection
- [SQL Injection cheatsheet](https://github.com/sqlmapproject/sqlmap/wiki/SQL-Injection-Cheatsheet)
- [SQL Injection Payload List](https://github.com/payloadbox/sql-injection-payload-list)
Awesome-Hacking:
### SQL Injection
* [SQL Injection cheatsheet](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/)
* [SQL Injection Wiki](https://sqlwiki.netspi.com/)
Both repositories use similar Markdown formatting, but awesome-web-security tends to have more detailed categorization and subcategories for easier navigation.
A list of web application security
Pros of awesome-web-hacking
- More focused on web-specific hacking tools and resources
- Better organized with clear categories for different aspects of web hacking
- Includes a section on practice labs and vulnerable applications for hands-on learning
Cons of awesome-web-hacking
- Less comprehensive overall compared to Awesome-Hacking
- Fewer contributors and updates, potentially leading to outdated information
- Limited coverage of non-web hacking topics and general cybersecurity resources
Code comparison
While both repositories primarily consist of curated lists rather than code, here's a comparison of their README structures:
awesome-web-hacking:
# Awesome Web Hacking
- [Tools](#tools)
- [Vulnerability Scanners](#vulnerability-scanners)
- [Attacks](#attacks)
Awesome-Hacking:
# Awesome Hacking
- [Awesome Repositories](#awesome-repositories)
- [Awesome Websites](#awesome-websites)
- [Awesome Tools](#awesome-tools)
Both repositories use similar Markdown structures, but Awesome-Hacking has a broader scope with more diverse categories, while awesome-web-hacking focuses specifically on web hacking topics.
A curated list of awesome Hacking tutorials, tools and resources
Pros of awesome-hacking
- More focused on specific hacking tools and techniques
- Includes sections on mobile hacking and game hacking
- Provides links to online hacking practice platforms
Cons of awesome-hacking
- Less comprehensive overall compared to Awesome-Hacking
- Not as frequently updated as Awesome-Hacking
- Lacks some categories present in Awesome-Hacking (e.g., honeypots, forensics)
Code comparison
While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, they do use different markdown formatting styles:
awesome-hacking:
## Tools
* [Nmap](https://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits
* [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer
Awesome-Hacking:
### Network Hacking
- [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer.
- [Nmap](https://nmap.org/) - A free security scanner for network exploration & security audits.
Both repositories serve as valuable resources for ethical hacking and cybersecurity enthusiasts. Awesome-Hacking offers a more extensive collection of resources across various categories, while awesome-hacking provides a more focused approach on specific hacking techniques and tools. The choice between the two depends on the user's specific needs and interests in the field of ethical hacking.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
Awesome Hacking
A collection of awesome lists for hackers, pentesters & security researchers.
Your contributions are always welcome !
Awesome Repositories
Repository | Description |
---|---|
Android Security | Collection of Android security related resources |
AppSec | Resources for learning about application security |
Asset Discovery | List of resources which help during asset discovery phase of a security assessment engagement |
Bug Bounty | List of Bug Bounty Programs and write-ups from the Bug Bounty hunters |
Capsulecorp Pentest | Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis |
Celluar Hacking | This is a list of hacking research in the 3G/4G/5G cellular security space. |
CTF | List of CTF frameworks, libraries, resources and softwares |
Cyber Skills | Curated list of hacking environments where you can train your cyber skills legally and safely |
DevSecOps | List of awesome DevSecOps tools with the help from community experiments and contributions |
Embedded and IoT Security | A curated list of awesome resources about embedded and IoT security |
Exploit Development | Resources for learning about Exploit Development |
Fuzzing | List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis |
Hacking | List of awesome Hacking tutorials, tools and resources |
Hacking Resources | Collection of hacking / penetration testing resources to make you better! |
Honeypots | List of honeypot resources |
Incident Response | List of tools for incident response |
Industrial Control System Security | List of resources related to Industrial Control System (ICS) security |
InfoSec | List of awesome infosec courses and training resources |
IoT Hacks | Collection of Hacks in IoT Space |
Mainframe Hacking | List of Awesome Mainframe Hacking/Pentesting Resources |
Malware Analysis | List of awesome malware analysis tools and resources |
OSINT | List of amazingly awesome Open Source Intelligence (OSINT) tools and resources |
OSX and iOS Security | OSX and iOS related security tools |
Pcaptools | Collection of tools developed by researchers in the Computer Science area to process network traces |
Pentest | List of awesome penetration testing resources, tools and other shiny things |
PHP Security | Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities |
Real-time Communications hacking & pentesting resources | Covers VoIP, WebRTC and VoLTE security related topics |
Red Teaming | List of Awesome Red Team / Red Teaming Resources |
Reversing | List of awesome reverse engineering resources |
Reinforcement Learning for Cyber Security | List of awesome reinforcement learning for security resources |
Sec Talks | List of awesome security talks |
SecLists | Collection of multiple types of lists used during security assessments |
Security | Collection of awesome software, libraries, documents, books, resources and cools stuffs about security |
Serverless Security | Collection of Serverless security related resources |
Social Engineering | List of awesome social engineering resources |
Static Analysis | List of static analysis tools, linters and code quality checkers for various programming languages |
The Art of Hacking Series | List of resources includes thousands of cybersecurity-related references and resources |
Threat Intelligence | List of Awesome Threat Intelligence resources |
Vehicle Security | List of resources for learning about vehicle security and car hacking |
Vulnerability Research | List of resources about Vulnerability Research |
Web Hacking | List of web application security |
Web3 Security | A curated list of web3 Security materials and resources For Pentesters and Bug Hunters. |
Windows Exploitation - Advanced | List of Awesome Advanced Windows Exploitation References |
WiFi Arsenal | Pack of various useful/useless tools for 802.11 hacking |
YARA | List of awesome YARA rules, tools, and people |
Hacker Roadmap | A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking. |
Other Useful Repositories
Repository | Description |
---|---|
Adversarial Machine Learning | Curated list of awesome adversarial machine learning resources |
AI Security | Curated list of AI security resources |
API Security Checklist | Checklist of the most important security countermeasures when designing, testing, and releasing your API |
APT Notes | Various public documents, whitepapers and articles about APT campaigns |
Bug Bounty Reference | List of bug bounty write-up that is categorized by the bug nature |
Cryptography | Cryptography resources and tools |
CTF Tool | List of Capture The Flag (CTF) frameworks, libraries, resources and softwares |
CVE PoC | List of CVE Proof of Concepts (PoCs) |
CVE PoC updated daily | List of CVE Proof of Concepts (PoCs) updated daily by Trickest |
CyberChef | A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. |
Detection Lab | Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices |
Forensics | List of awesome forensic analysis tools and resources |
Free Programming Books | Free programming books for developers |
Gray Hacker Resources | Useful for CTFs, wargames, pentesting |
GTFOBins | A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions |
Hacker101 | A free class for web security by HackerOne |
Infosec Getting Started | A collection of resources, documentation, links, etc to help people learn about Infosec |
Infosec Reference | Information Security Reference That Doesn't Suck |
IOC | Collection of sources of indicators of compromise |
Linux Kernel Exploitation | A bunch of links related to Linux kernel fuzzing and exploitation |
Lockpicking | Resources relating to the security and compromise of locks, safes, and keys. |
Machine Learning for Cyber Security | Curated list of tools and resources related to the use of machine learning for cyber security |
Payloads | Collection of web attack payloads |
PayloadsAllTheThings | List of useful payloads and bypass for Web Application Security and Pentest/CTF |
Pentest Cheatsheets | Collection of the cheat sheets useful for pentesting |
Pentest Wiki | A free online security knowledge library for pentesters / researchers |
Probable Wordlists | Wordlists sorted by probability originally created for password generation and testing |
Resource List | Collection of useful GitHub projects loosely categorised |
Reverse Engineering | List of Reverse Engineering articles, books, and papers |
RFSec-ToolKit | Collection of Radio Frequency Communication Protocol Hacktools |
Security Cheatsheets | Collection of cheatsheets for various infosec tools and topics |
Security List | Great security list for fun and profit |
Shell | List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell |
ThreatHunter-Playbook | A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns |
Web Security | Curated list of Web Security materials and resources |
Vulhub | Pre-Built Vulnerable Environments Based on Docker-Compose |
Need More ?
Follow Hack with GitHub on your favorite social media to get daily updates on interesting GitHub repositories related to Security.
- Twitter : @HackwithGithub
- Facebook : HackwithGithub
Contributions
Please have a look at contributing.md
Top Related Projects
A collection of hacking / penetration testing resources to make you better!
A collection of awesome penetration testing resources, tools and other shiny things
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
🐶 A curated list of Web Security materials and resources.
A list of web application security
A curated list of awesome Hacking tutorials, tools and resources
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot