> cat /dev/github | grep security-tools
discovered 30 Mar 2026

Awesome-Cybersecurity-Handbooks

★ 3332 via github-topic
→ View on GitHub

AI Summary: The “Awesome Cybersecurity Handbooks” repository is a comprehensive collection of resources and personal notes aimed at aiding individuals in the fields of red teaming and Capture The Flag (CTF) challenges. This tool features a variety of topics including information gathering, vulnerability analysis, web application assessment, and post-exploitation strategies, serving as an extensive guide for cybersecurity professionals to enhance their knowledge and skills for legal purposes. Notable aspects include frequent updates and a commitment to legal and ethical use of the provided materials.


README

Awesome Cybersecurity Handbooks Awesome

GitHub stars GitHub forks GitHub watchers
GitHub commit activity (branch) GitHub contributors

A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often.

[!IMPORTANT] Please note that these documents are only provided for legal purposes. Please do not use the content for illigal actions.

If you like the project, give it a :star: or share it on various platforms. My goal is to create and to gather resources for people to help them on their career.

[!NOTE] As always, it is pretty hard to point out every source for different tools or payloads. If I used your payload anywhere in my notes and you wanted to be mentioned, feel free to reach out to me on X — or preferably Bluesky — and I will add you asap.

Thank you for reading.


Table of Contents

01 Information GatheringAttack Surface ManagementEDR & XDRSecure Architecture
02 Vulnerability AnalysisBasicsEvasionSecurity Operations Center
03 Web Application AnalysisBlockchainExploitationSIEM
04 Database AssessmentBug BountyFrameworksSimulation & Emulation
05 Password AttacksCloudHardwareSOAR & SecOps
06 Wireless AttacksCommand and ControlIDS & IPSTemplates
07 Reverse EngineeringContainerIoTThreat Hunting
08 Exploitation ToolsCryptographyMalware DevelopmentThreat Modeling
09 Sniffing & SpoofingCVEMobileWordlists
10 Post ExploitationCyber Threat IntelligenceOperations Security
11 ForensicsDecrypterOSINT
12 Reporting ToolsDeliveryPayloads
13 Social Engineering ToolsDetection EngineeringPersistence
AI & MLDFIRPrivacy