Awesome Hacking [](https://twitter.com/intent/tweet?text=Awesome%20Hacking%20-%20a%20collection%20of%20awesome%20lists%20for%20hackers%20and%20pentesters%20by%20@HackwithGithub&url=https://github.com/Hack-with-Github/Awesome-Hacking&hashtags=security,hacking)

May 7, 2026 ยท View on GitHub

Awesome Hacking

Awesome Hacking Tweet

A collection of awesome lists for hackers, pentesters & security researchers.

Your contributions are always welcome !

Awesome Repositories

RepositoryDescription
Android SecurityCollection of Android security related resources
AppSecResources for learning about application security
Asset DiscoveryList of resources which help during asset discovery phase of a security assessment engagement
Bug BountyList of Bug Bounty Programs and write-ups from the Bug Bounty hunters
Cellular HackingThis is a list of hacking research in the 3G/4G/5G cellular security space.
CI/CD AttacksOffensive research of CI/CD systems and deployment processes
CTFList of CTF frameworks, libraries, resources and softwares
Cyber Security UniversityFree educational resources that focus on learning cybersecurity by doing
Cyber SkillsCurated list of hacking environments where you can train your cyber skills legally and safely
CybersourcesA collection of all types of tools and resources for cybersecurity
Detection EngineeringResources for designing, building, and operating detective cybersecurity controls
DevSecOpsList of awesome DevSecOps tools with the help from community experiments and contributions
Drone HackingList of Drone hacking tools and resources
Embedded and IoT SecurityA curated list of awesome resources about embedded and IoT security
FuzzingList of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis
HackingList of awesome Hacking tutorials, tools and resources
HoneypotsList of honeypot resources
Incident ResponseList of tools for incident response
Industrial Control System SecurityList of resources related to Industrial Control System (ICS) security
InfoSecList of awesome infosec courses and training resources
IoT and Hardware SecurityCollection of tools, books, resources and software about IoT and hardware security
Mainframe HackingList of Awesome Mainframe Hacking/Pentesting Resources
Malware AnalysisList of awesome malware analysis tools and resources
Malware PersistenceTechniques adversaries use to maintain system access across restarts
Node.js SecurityCurated list of tools, security incidents and other resources around Node.js security
OSINTList of amazingly awesome Open Source Intelligence (OSINT) tools and resources
OSX and iOS SecurityOSX and iOS related security tools
Password CrackingTools and resources for recovering passwords
PcaptoolsCollection of tools developed by researchers in the Computer Science area to process network traces
PentestList of awesome penetration testing resources, tools and other shiny things
PHP SecurityLibraries for generating secure random numbers, encrypting data and scanning for vulnerabilities
Prompt InjectionPrompt injection vulnerabilities targeting AI and LLM systems
Real-time Communications hacking & pentesting resourcesCovers VoIP, WebRTC and VoLTE security related topics
Red Teaming ToolkitCutting-edge open-source security tools (OST) for red teamers and threat hunters
Reinforcement Learning for Cyber SecurityList of awesome reinforcement learning for security resources
ReversingCollection of resources to learn Reverse Engineering from start
Sec TalksList of awesome security talks
SecListsCollection of multiple types of lists used during security assessments
SecurityCollection of awesome software, libraries, documents, books, resources and cools stuffs about security
Social EngineeringList of awesome social engineering resources
Static AnalysisList of static analysis tools, linters and code quality checkers for various programming languages
The Art of Hacking SeriesList of resources includes thousands of cybersecurity-related references and resources
Threat IntelligenceList of Awesome Threat Intelligence resources
Vehicle SecurityList of resources for learning about vehicle security and car hacking
Web HackingList of web application security
Web3 SecurityA curated list of web3 Security materials and resources For Pentesters and Bug Hunters.
YARAList of awesome YARA rules, tools, and people

Other Useful Repositories

RepositoryDescription
AI SecurityCurated list of AI security resources
Annual Security ReportsCybersecurity trends, insights, and challenges from annual reports
API Security ChecklistChecklist of the most important security countermeasures when designing, testing, and releasing your API
APT NotesVarious public documents, whitepapers and articles about APT campaigns
Bug Bounty ReferenceList of bug bounty write-up that is categorized by the bug nature
Capsulecorp PentestVagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis
CryptographyCryptography resources and tools
CVE PoCList of CVE Proof of Concepts (PoCs) updated daily by Trickest
CyberChefA simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages.
Detection LabVagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
Executable PackingResources about executable packing and unpacking
ForensicsList of awesome forensic analysis tools and resources
Free Programming BooksFree programming books for developers
GTFOBinsA curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions
Hacker101A free class for web security by HackerOne
Infosec Getting StartedA collection of resources, documentation, links, etc to help people learn about Infosec
Infosec ReferenceInformation Security Reference That Doesn't Suck
IOCCollection of sources of indicators of compromise
Linux Kernel ExploitationA bunch of links related to Linux kernel fuzzing and exploitation
Machine Learning for Cyber SecurityCurated list of tools and resources related to the use of machine learning for cyber security
PayloadsCollection of web attack payloads
PayloadsAllTheThingsList of useful payloads and bypass for Web Application Security and Pentest/CTF
Pentest WikiA free online security knowledge library for pentesters / researchers
Probable WordlistsWordlists sorted by probability originally created for password generation and testing
Red Team Physical ToolsCurated list of tools for physical security, red teaming, and tactical covert entry
Reverse EngineeringList of Reverse Engineering articles, books, and papers
RFSec-ToolKitCollection of Radio Frequency Communication Protocol Hacktools
Security CheatsheetsOWASP Cheat Sheet Series for application security
ShellList of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell
SuricataSuricata IDS/IPS and network security monitoring resources
ThreatHunter-PlaybookA Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns
TorResources about the Tor network and anonymous communication
VulhubPre-Built Vulnerable Environments Based on Docker-Compose
Web SecurityCurated list of Web Security materials and resources

Need More ?

Follow Hack with GitHub on your favorite social media to get daily updates on interesting GitHub repositories related to Security.

Contributions

Please have a look at contributing.md