awesome-hacking
AI Summary: Awesome hacking is an awesome collection of hacking tools.
Awesome hacking is an awesome collection of hacking tools.
A cybersecurity tools aggregator — discover the latest pentesting, red team, and offensive security tools from GitHub.
AI Summary: Awesome hacking is an awesome collection of hacking tools.
Awesome hacking is an awesome collection of hacking tools.
AI Summary: The “awesome-hacking-lists” repository is a curated collection of GitHub stars organized by programming languages and tools relevant to cybersecurity and hacking. Its primary use case is to provide a comprehensive reference for security professionals and enthusiasts looking for resources, projects, and exploits in various programming environments. Notable features include structured content for easy navigation and a wide array of topics spanning multiple technology stacks.
A curated list of my GitHub stars! Generated by starred.
AI Summary: Awesome Hacking Resources is a comprehensive collection of materials designed for individuals looking to enhance their skills in hacking and penetration testing. The repository includes various categories such as learning resources, online courses, forums, and tools crucial for topics like malware analysis and network scanning, promoting community contribution and knowledge sharing within the cybersecurity field. Notably, it features a dedicated list of tools and links to educational content, making it a valuable resource for both beginners and advanced practitioners.
AI Summary: The “Awesome Cybersecurity List” repository aggregates a personal collection of insightful blog posts, research papers, and write-ups pertaining to various aspects of cybersecurity. It serves as a resource for both enthusiasts and professionals looking for in-depth analysis on contemporary cybersecurity topics and advancements. Notable features include a chronological outline of topics and a dedicated section for cybersecurity tools, ensuring users can easily navigate through valuable content.
My personal collection of awesome blog posts, write-ups, and papers focusing on cybersecurity.
AI Summary: The “Awesome List of Secrets in Environment Variables” repository provides a comprehensive compilation of sensitive information, such as secrets, API keys, and tokens commonly stored in environment variables across various platforms. Its primary use case is to educate and inform developers about potential vulnerabilities associated with storing secrets in environment variables and to suggest better security practices to avoid data leaks. Notable features include categorized listings of secrets from different services, security recommendations, and links to relevant documentation for each entry.
AI Summary: The
awesome-llvm-securityrepository is a curated collection of skills designed for AI agents and coding assistants that focus on LLVM security topics. It provides a set of specialized techniques, including binary lifting, dynamic instrumentation, code obfuscation, and various LLVM tooling resources, making it a valuable asset for developers and researchers in compiler development and security hardening. Notable features include an easy installation process for these skills usingnpxand comprehensive resources for learning and implementing LLVM-related security practices.
AI Summary: The Awesome Malware Analysis repository provides a comprehensive curated list of malware analysis tools and resources, aimed at enhancing research and understanding of malware threats. Notable features include sections on various categories such as malware collections, open-source threat intelligence, detection and classification methodologies, and online scanners, facilitating a structured approach for analysts. This resource serves as a valuable reference for cybersecurity professionals seeking effective tools for malware research and investigation.
AI Summary: The “awesome-mobile-security” repository serves as a comprehensive resource for mobile security professionals, aggregating a wide range of blogs, papers, and how-to resources relevant to Android security and penetration testing. Its primary use case is to provide guidance and knowledge on mobile application vulnerabilities, security testing methodologies, and tools, making it a valuable asset for those aiming to improve mobile application security. Notable features include links to various security guides, OWASP resources, and pentesting labs, enabling users to deepen their understanding and practical skills in mobile security.
AI Summary: The “Awesome One-liner Bug Bounty” repository compiles a collection of efficient one-liner scripts specifically designed for bug bounty hunting, enabling users to identify vulnerabilities in web applications quickly. Notable features include commands for detecting Local File Inclusion, Open Redirects, Cross-Site Scripting, and various CVEs, all leveraging concise syntax to streamline reconnaissance and exploitation tasks. The repository encourages community contributions, fostering a collaborative environment for continuous improvement and sharing of bug bounty strategies.
AI Summary: The Awesome OSCP repository is a curated collection of resources aimed at individuals preparing for the Offensive Security Certified Professional (OSCP) certification. It includes a variety of materials such as reviews, guides, cheatsheets, and specialized scripts covering key topics like buffer overflows and privilege escalation, facilitating a structured and comprehensive study approach for aspiring penetration testers. Notable features include extensive links to preparation guides, practical hacking tips, and tools specifically designed to aid in the OSCP exam.
AI Summary: Awesome OSINT is a curated repository of open-source intelligence tools and resources designed for individuals involved in Cyber Threat Intelligence (CTI) and threat hunting. The repository offers a comprehensive list of utilities across various categories, including search engines, social media tools, and data analysis resources, catering to users from beginner to advanced levels. Notable features include specialized searches for academic resources, geospatial mapping, threat actor insights, and dark web exploration, enabling proactive intelligence gathering from publicly available sources.
AI Summary: Awesome OSINT For Everything is a comprehensive repository of OSINT tools and websites aimed at penetration testing, red teaming, information gathering, and bug bounty initiatives. It organizes a wide array of resources categorized by specific use cases such as recon, threat intelligence, social media analysis, and more, making it a valuable tool for cybersecurity professionals seeking to enhance their investigative capabilities. Notable features include a detailed index of tools across various domains, including geo-location, cryptocurrency, and privacy/security resources, providing users with extensive options for OSINT-related tasks.
AI Summary: The “awesome-php-security” repository is a curated collection of resources focused on enhancing security in PHP applications. Its primary use case is to provide developers with tools, educational materials, and best practices to mitigate security vulnerabilities. Notable features include sections on web framework hardening, static code analysis tools, and a comprehensive list of vulnerabilities and security advisories.
AI Summary: Awesome Privilege Escalation is a comprehensive resource that curates techniques, tools, and methodologies for privilege escalation across multiple platforms, including Linux, Windows, Docker, and cloud environments. It features a structured table of contents with links to guides, techniques, and relevant presentations, allowing security professionals to efficiently explore various escalation vectors and strategies. Notable sections include targeted discussions on specific operating system techniques and curated tools for CVE identification and exploitation.
AI Summary: The “awesome-python-security” repository is a curated collection of resources focused on security related to Python programming. Its primary use case is to serve developers and security professionals by aggregating tools, educational materials, and references for secure coding practices, vulnerability detection, and compliance. Notable features include a categorized list of security tools like static code analysis, frameworks for web application security, and links to vulnerability databases and educational resources.
AI Summary: The ‘awesome-rat’ repository serves as a comprehensive catalog of over 250 open-source Remote Access Tools (RATs) and associate Command & Control (C&C) frameworks, along with 1200+ analytical reports and articles related to RATs. It provides a structured directory that categorizes both open-source and commercial tools, as well as notable examples of malicious software, making it a valuable resource for cybersecurity professionals seeking to understand and analyze RATs and their implications. Key features include a detailed listing of tools, extensive documentation, and links to related research articles.
AI Summary: The “Awesome RCE Techniques” repository is an open-source knowledge database that compiles various methods for achieving Remote Code Execution (RCE) across different applications. It features a collection of 24 RCE techniques categorized by platform type, including Content Management Systems and frameworks, each accompanied by Docker images for practical training and testing. This resource facilitates learning and experimentation for security professionals and developers interested in RCE dynamics.
Awesome list of techniques to achieve Remote Code Execution (RCE) on various apps!
AI Summary: Awesome-Redteam is a comprehensive knowledge base designed for red teaming and offensive security research, providing users with a curated collection of tools, scripts, and tips. It features organized sections covering various aspects such as cybersecurity cheat sheets, cryptographic methods, cyberspace search tools, and open-source intelligence resources, all intended for educational purposes. The repository emphasizes legal usage and warns against employing its content for unauthorized activities.
❗【免责声明】本项目所涉及的技术、思路和工具仅供学习,任何人不得将其用于非法用途和盈利,不得将其用于非授权渗透测试,否则后果自行承担,与本项目无关。 使用本项目前请先阅读 法律法规。
AI Summary: The Awesome Red Team Cheatsheet is a comprehensive reference tool designed for red team practitioners, providing techniques and methodologies for various stages of the attack lifecycle, including initial access, privilege escalation, lateral movement, and evasion strategies. It offers detailed sections on specific tactics like credential dumping, active directory exploitation, and OSINT, along with supporting guides on Windows protocols and operational security (OPSEC). Notable features include links to targeted exploitation techniques and enumeration strategies, aiding cybersecurity professionals in simulating attacks and improving defensive measures.
AI Summary: Awesome Security Hardening is a comprehensive repository that compiles best practices, guides, and resources for security hardening across various platforms including operating systems, network devices, and cloud services. Its notable features include detailed checklists, benchmarks (like CIS and ANSSI), and a curated list of tools for assessing and implementing security measures, catering to both general users and cybersecurity professionals. The project encourages community contributions to continually enhance its breadth and usability.
AI Summary: The Awesome Social Engineering repository offers a curated collection of resources and tools specifically designed for cybersecurity professionals, penetration testers, and educational purposes within controlled environments. It features a diverse range of materials, including online courses, literature on psychology relevant to social engineering, and tools for practical application, making it a comprehensive guide for those interested in the field. Notably, it emphasizes ethical use and provides an engaging platform for learning and skill enhancement in social engineering techniques.
AI Summary: Awesome-Telegram-OSINT is a comprehensive repository designed for Open Source Intelligence (OSINT) related to Telegram. Its primary use case is to facilitate the search and discovery of Telegram channels, groups, and tools through a curated list of search engines and directories. Notable features include a wide array of resources for searching Telegram content, including specialized databases, search engines, and community-driven catalogs, making it a valuable tool for researchers and analysts in the OSINT community.
AI Summary: The “awesome-termux-hacking” repository aggregates a collection of tools designed for penetration testing and security assessments on Android devices using the Termux environment. Key tools include ANDRAX, a robust penetration testing platform that functions natively on Android, and ReconCobra, an automated pentest framework for information gathering. This repository enhances the capabilities of ethical hacking on mobile platforms by offering various utilities for tasks such as subdomain enumeration, exploit searching, and proxy management.
AI Summary: The “awesome-web-hacking” repository serves as a comprehensive resource for individuals seeking to enhance their knowledge of web application security. It includes categorized lists of books, documentation, tools, cheat sheets, and educational courses, making it a valuable starting point for learning about penetration testing and various security vulnerabilities. Notable features include contributions from the community through pull requests and a diverse array of resources for both beginners and experienced security professionals.
AI Summary: Awesome YARA is a curated repository that aggregates a comprehensive collection of YARA rules, tools, and resources aimed at enhancing malware detection and analysis. It serves as a valuable resource for cybersecurity professionals and researchers, featuring contributions from various practitioners, performance guidelines, and annual challenges to foster community engagement in YARA rule creation. Notable features include a wide array of rule collections from established cybersecurity entities and active maintenance status indicators for repositories of interest.