README.md

April 30, 2026 · View on GitHub

image

Welcome to the Cybersources! This project serves as a central hub for a wide range of tools, resources, and educational materials designed for cybersecurity professionals, enthusiasts, and learners. Whether you're just starting out or an experienced expert, you'll find everything you need to enhance your skills, stay updated with industry trends, and deepen your knowledge in this fast-evolving field.

🎉 Join now the discord community (+2k members): http://discord.gg/cybersources 🎉

Reddit


Hudson Rock

📋 Content

OSINT

Pentesting

Cryptography

Forensic & Malware Analysis

Anonymity and Security Tools

Utility & Miscellaneous

AI Tools

Specialized Tools

Hardware & Operating Systems

Learning & Training Resources

Social and Media

Repository

1. OSINT

1.1 OSINT

ToolDescription
OsintLabsTools and sites useful for osint
OSINT FrameworkHUGE collection of OSINT tools
MitakaMitaka is a browser extension that makes your OSINTsearch & scan easier
osint.rocksA resource for locating and investigating individuals.
Pim EyesFacial recognition tool for reverse image searches.
IntelTechniquesSearch engine tailored for OSINT investigations across multiple data types.
CybdetectiveVisual global directory of OSINT tools.
Face ComparisonCompare facial images to find matches.
OSINT FrameworkExtensive repository of OSINT tools and techniques.
FaceCheckIDReverse image lookup specialized in facial recognition.
Social CatfishFind people using names, images, or other details.
Google LensAI-powered tool to analyze and extract information from images.
LensoAIAI-driven platform for reverse image searching.
OSINT Investigation AssistantAn OSINT Investigation Assistant designed to help with people investigations
ClatScopeThe best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach information and much more (42 features).
DataSurgeonIt allows for the extraction of various types of sensitive information including emails, phone numbers, hashes, credit cards, URLs, IP addresses, MAC addresses, SRV DNS records and more.
Deep Dork WebAutomate Google Dorking for OSINT investigations. Search indexed sensitive data efficiently with pre-built queries.
Digital Digging OSINTCollection of OSINT resources are organized by country and are useful for researchers, fact-checkers, and digital profilers.
toposintOpen Source Intelligence collections and other interests.
The OSINT RackA curated and growing list of open-source intelligence tools; explore resources across recon, social media, metadata, geolocation, and more.
Breach HouseAn Open Crawler about Ransomware leaks, Traditional Breaches, Infostealer packages and Leads into a dark forums, telegram and dark web.
AboutIntelCybersecurtiy Threat Inteligence platform that helps security and IT teams monitor, filter and prioritases OSINT and threat intelligence.
ToolDescription
UserSearchFree tool to search usernames on 2000+ websites.
CheckUserSearch for usernames across social networks.
Digital Footprint CheckFree tool to verify usernames registered on hundreds of sites.
IDCrawlFind usernames on popular social networks.
MaigretCollect detailed information on individuals using their username.
Name ChkVerify usernames on over 90 social media platforms and 30 domain extensions.
Name CheckrSearch for domains and usernames across multiple platforms.
Name CheckupCheck username and domain availability across social media and websites.
NexFilIdentify usernames across nearly all social network sites.
SeekrMulti-tool for OSINT data management, note-taking, and username checking.
SherlockEyeDiscover publicly available information tied to a username.
SnoopSearch for nicknames and usernames on the web within the OSINT domain.
InteltechniquesCollection of OSINT tools for diverse investigations.
League of Legends ArchiverArchive and search past web data, with a focus on low-level intelligence collection.
NameMCSearch and verify Minecraft usernames.
NamevineA tool to check name availability across various websites.
OSINT-RocksA collection of open-source intelligence tools for various investigative purposes.
Peek YouSearch engine that finds publicly available data about individuals and their online profiles.
SherlockSearch for usernames across social media and other websites.
Social SearcherOSINT tool to search social media platforms for public information.
UnAvatarDiscover avatars tied to an email address across different platforms.
Instant UsernameInstantly check username availability across multiple platforms as you type.
NamesDirNamesdir is a simple web tool to list most of the existing first names for a surname and vice versa.
Amazon UsernamesURL for search usernames for Amazon
GitHub UsernamesURL to find GitHub users.
Tinder UsernamesURL to find tinder users.
Footprint IQFootprintIQ helps you see where your personal information appears online.
ToolDescription
EpieosAnalyze and investigate email addresses.
BreachDirectoryExplore databases of breached email accounts.
MailTesterLocate email addresses and optimize email deliverability.
MXToolboxTroubleshoot and investigate email server issues using free tools.
DeHashedPrevent account takeovers with breach notifications and data analysis.
EmailHippoVerify if an email address exists with accuracy.
GhuntInvestigate Google-related emails and associated documents.
GitreconScan GitHub repositories for exposed emails and names.
h8mailPerform local or premium email OSINT and password breach hunting.
Have I Been PwnedCheck whether an email address has been exposed in data breaches.
HoleheDiscover accounts linked to email addresses across various platforms.
LeakCheckSearch over 7.5B breached entries for emails, usernames, and other data.
ActiveTK.jpObtain Google account information from a Gmail address, such as name, profile image, and services used.
Black KiteCybersecurity tool for assessing third-party risks.
Hudson Rock Cybercrime Intelligence ToolsComprehensive tools for cybercrime intelligence and monitoring.
IntelltechniquesCollection of OSINT tools for diverse investigations.
OCCRP AlephInvestigative platform for OSINT tools, particularly useful for journalists and activists.
OmailOSINT tool for checking email addresses against multiple online sources.
OSINT-RocksA collection of open-source intelligence tools for various investigative purposes.
Peek YouSearch engine that finds publicly available data about individuals and their online profiles.
Predicta SearchTool that enables users to search for digital data across various online platforms.
SkymemEmail lookup tool that tracks and archives email addresses, searching for data leaks and more.
SynapsintOSINT search engine for finding public data across social networks and websites.
That's ThemProvides a quick search for people and email addresses to locate social profiles and data.
WhoisologyOSINT platform used for investigating domain ownership, email addresses, and IP data.
Ashley Madison EmailsWas your profile compromised in the Ashley Madison hack?
MailBox ValidatorValidate and clean your email list by detecting disposable emails, invalid emails, mail server and much more.
EmailRepIlluminate the "reputation" behind an email address
ReadNotifyReadNotify lets you know when email you've sent gets read!
MailScrapThis email verification tool actually connects to the mail server and checks whether the mailbox exists or not, wipeout disposable email addresses from your email list.
Check-if-email-existsCheck if an email address exists without sending any email, written in Rust. Comes with a ⚙️ HTTP backend.
OneLookEnter a word, phrase, description, or pattern above to find synonyms, related words, and more.
Email PermutatorThis tool is intended to help you find the email addresses of people you need to contact.
ToofrFind Anyone’s Email Address in Seconds. Instantly connect with decision-makers that matter to your business.
SkymemFind email addresses of companies and people
the HarvesterE-mails, subdomains and names Harvester - OSINT
VoilanobertI can find anyone's email address
HunterHunter is your all-in-one email outreach platform.
SingalHireFind Valid Emails and Phone Numbers
LeakRadarInstant search across 2 B+ plain-text info-stealer credentials; email, domain, metadata queries, monitoring & API
Have I Been RansomBecause people have the right to know if their data has been leaked. Check if you have been ransomed.
ToolDescription
phoneinfogaInformation gathering framework for phone numbers

1.5 GEOINT

ToolsDescription
BellingcatGeospatial intelligence and analysis.
OhShintGeospatial OSINT tools.
GeoSpyThe World's Best AI Geolocation Tool
PicartaWe find where a photo has been taken in the world using Artificial Intelligence.
IPLoggerIP Logger link shortener with geolocalizaction with advanced analytics.
GeoNamesThe GeoNames geographical database with over 11 million placenames.
Geoseer.netSearch over 3.5 million spatial GIS datasets hosted on over 40k live services.
GeoINT SearchCustom Google search for geographical-related queries.
Earth Engine DatasetPublic data archive with over 40 years of imagery and scientific datasets.
GeoPlatform PortalCross-agency collaborative effort for geospatial data sharing and transparency.
FAO Map CatalogCollection of geographical maps from the FAO.
GeocreepyGeolocation OSINT tool for gathering location data from social networks.
US Crisis MonitorIn-depth coverage of political violence trends in the US.
Toronto LiveProvides live information about public schools, traffic, bike shares, etc.
GeoProtests APIQuery and visualize protests worldwide with spatial aggregations.
GeoINT-pyA collection of geospatial intelligence workflows implemented in Python.
OverPass TurboWays I use ChatGPT with OverpassTurbo for OSINT Geolocation Research
GeoHintsGeolocation hints and tips for OSINT investigations.
GeoGuessr AssistantAn assistant tool for the GeoGuessr game, providing geolocation support.
GeoTipsA guide for geolocation strategies and tips.
PlonkitProvides resources for geolocation and map-related guidance.
GeoEstimation LabsA platform for geolocation estimation and analysis.
Google EarthExplore the world with 3D maps and satellite imagery.
MapillaryStreet-level imagery platform for mapping and geolocation research.
World Imagery WaybackAccess archived imagery for geospatial analysis.
Zoom EarthLive weather maps, storm tracking, and global satellite imagery.
Sentinel PlaygroundExplore satellite imagery and geospatial data from Sentinel satellites.
Real-Time Satellite TrackingTrack satellites and view predictions in real-time.
SunCalcCalculate sunrise, sunset, shadow length, and solar position data on a map.
Map DevelopersCustom Google Map API solutions and tools for developers.
OSM FinderOpenStreetMap search and navigation tool for location data.
PeakVisorAR app and site for exploring mountains and hiking trails.
Bellingcat OSM SearchGuide and tool for geolocation using OpenStreetMap.
Google MapsA widely used tool for mapping, navigation, and geolocation searches.
Overpass TurboA web-based tool for querying and filtering OpenStreetMap data.
Google Earth3D mapping and satellite imagery tool for exploring locations globally.
MapillaryA street-level imagery platform for mapping and geospatial analysis.
World Imagery WaybackAccess archived satellite imagery for geospatial and temporal analysis.
Zoom EarthLive weather map and satellite imagery with storm tracking and rain radar.
Sentinel PlaygroundExplore satellite imagery and analyze geospatial data from Sentinel satellites.
Real-Time Satellite TrackingTrack satellites and view real-time predictions for their paths.
SunCalcA solar position calculator for determining sunrise, sunset, and shadow lengths on a map.
Map DevelopersProvides custom Google Map API solutions and tools for advanced mapping needs.
GeoSpy AIConvert pixels into actionable location intelligence using AI.

1.6 Photo / Images

ToolsDescription
Photo.OsintList of all tools for photo and images OSINT.
Foto ForensicsAll the metadata of an image.
ExiftoolA terminal based tool for extracting images meta data.

1.7 Social Networks

1.7.1 Instagram

ToolsDescription
Aware Online: Instagram Search ToolInstagram Search Tool
CombinInstagram marketing tool for managing and growing your account.
Comment PickerTool for selecting random winners from comments.
Display PurposesTool for finding hashtags related to your content.
DownAlbumChrome extension for downloading photos and videos from Instagram.
Engagement-calculatorTool for calculating engagement rates on Instagram.
Export CommentsTool for exporting Instagram comments.
HashtagifyTool for finding and analyzing hashtags.
Hashtags for LikesTool for finding the best hashtags for Instagram.
HypeAuditorTool for analyzing the authenticity of influencers and their engagement.
IconosquareTool for managing and analyzing Instagram accounts.
IGSuperStarTool for finding Instagram influencers.
ImgbunkTool for searching and downloading Instagram photos.
ImgInnTool for viewing and downloading Instagram stories anonymously.
In TagsTool for finding the best tags for your Instagram posts.
INSSISTChrome extension for posting photos and stories on Instagram from desktop.
InstaFollowersTool for gaining followers and engagement on Instagram.
Instagram CrawlerTool for scraping Instagram data.
Instagram ExplorerTool for exploring Instagram profiles and posts.
Instagram OSINTOpen-source intelligence tool for Instagram.
Instagram ScraperTool for scraping Instagram posts and profiles.
Instagram Search Tool (Aware Online)Tool for searching Instagram profiles and posts.
InstaLoaderTool for downloading Instagram photos, videos, and metadata.
instaloctrackTool for tracking Instagram locations.
InstaLooterTool for downloading photos and videos from Instagram profiles.
KeyholeTool for tracking and analyzing social media campaigns.
LeetagsTool for finding the best hashtags for Instagram posts.
MetaHashtagsTool for generating and analyzing hashtags.
Minter.ioTool for Instagram analytics and reporting.
noninstagramTool for Instagram data analysis.
Osi.igTool for Instagram OSINT.
OsintgramOSINT tool for analyzing Instagram profiles and posts.
Otzberg.netTool for finding Instagram user IDs.
PanoramiqTool for scheduling and managing Instagram posts.
Phantom BusterAutomation tool for social media platforms.
PicodashTool for searching and organizing Instagram content.
ScyllaTool for Instagram OSINT and data scraping.
SkimagramTool for tracking Instagram activity.
Social-alertsTool for setting up social media alerts.
SocialInsiderTool for social media analytics and competitive analysis.
socid_extractorTool for extracting social media IDs.
SoIGTool for Instagram OSINT.
tailwindTool for scheduling and managing Instagram posts.
ThumbTubeTool for downloading Instagram profile pictures.
trendHEROTool for influencer marketing and analytics.
WebstagramInstagram web viewer and search tool.
FlufiA tool for exploring public stories, posts, reels, tags, followers, and more..
Find Instagram User IDA tool to find the Instagram user ID for any profile.

1.7.2 Linkedin

ToolsDescription
IntelligenceX: LinkedinLinkedIn search tool by IntelligenceX.
BridgeKeeperTool for OSINT on LinkedIn profiles.
CrossLinkedLinkedIn enumeration tool.
Email Reverse LookupTool for reverse email lookup on LinkedIn.
Free People Search ToolsComprehensive people search tool.
FTLChrome extension for LinkedIn OSINT.
osint.supportCollection of OSINT tools for LinkedIn.
InSpyLinkedIn enumeration tool.
Linkedin BookmarkletBookmarklet tools for LinkedIn OSINT.
Linkedin Profile ScraperTool for scraping LinkedIn profiles.
Linkedin Search TGCTool for searching LinkedIn profiles.
LinkedIntLinkedIn intelligence and OSINT tool.
Osint Support LinkedinSupport tools for LinkedIn OSINT.
Phantom BusterAutomation tool for LinkedIn tasks.
ravenLinkedIn enumeration and scraping tool.
Recruitin.netTool for recruiting on LinkedIn.
Recruitment GeekLinkedIn search tool for recruiters.
ScrapedInTool for scraping LinkedIn profiles.

1.7.3 TikTok

ToolsDescription---
Exolyt.comTool for analyzing TikTok profiles and videos.---
Hashtags for LikesTool for finding the best hashtags for TikTok posts.---
HypeAuditorTool for analyzing the authenticity of TikTok influencers.---
Influence GridTool for finding TikTok influencers.---
InstaFollowersTool for finding TikTok user IDs.---
Mavekite.comTool for managing and analyzing TikTok campaigns.---
OSINT Combine TikTok Quick SearchQuick search tool for TikTok profiles.---
Savefrom.netTool for downloading TikTok videos.---
Sinwindie TikTok Bookmarklet ToolsBookmarklet tools for TikTok OSINT.---
Snaptik.appTool for downloading TikTok videos.---
TikbuddyTool for analyzing TikTok profiles and content.---
TikTok APIAPI for interacting with TikTok.---
TikTok Creative Center StatisticsTool for finding trending hashtags and content on TikTok.---
TikTok DownloaderTool for downloading TikTok videos.---
TikTok HashtagsTool for generating TikTok hashtags.---
TikTok ScraperTool for scraping TikTok profiles and videos.---
TikTok TimestampTool for analyzing timestamps on TikTok videos.---
TikViewTool for searching TikTok profiles and content.---
tikvstockTool for stock and analyzing TikTok videos.---
TokvidTool for downloading TikTok videos.---
TubeHiTool for analyzing TikTok and YouTube content.---
VidniceTool for analyzing TikTok profiles and content.---

1.7.4 OnlyFans

ToolsDescription
fansmetrics.comTool for analyzing OnlyFans metrics.
Onlysearch.comSearch tool for finding OnlyFans profiles.
onlyfinder.comTool for finding OnlyFans creators.
hubite.com/onlyfans-search/OnlyFans search tool.
SimilarFansTool for finding similar OnlyFans profiles.
FanSearchComprehensive search tool for OnlyFans.

1.7.5 Discord

ToolsDescription
ASTRAAHOMEA collection of all-in-one tools for Discord.
Discord History TrackerA tool for tracking and saving chat histories in Discord.
DISBOARDA platform to discover and list Discord servers.
Discord Bots (Community)A collection of publicly available Discord bots created by community members, serving various functions.
Discord ID LookupAn unofficial tool for looking up Discord user information.
Discord Bots (Exploration)A vast collection to explore millions of Discord bots for different purposes.
DiscordServersA curated selection of popular and interesting public Discord servers.
Discord MeA site for finding public Discord servers and bots.
DiscordOSINTProvides resources for conducting research and OSINT investigations related to Discord accounts, servers, and bots.
Discord BotsA comprehensive directory of top Discord bots, apps, and servers, including popular music and economy bots.

1.7.6 Twitch

ToolsDescription
Twitch ToolsTool for viewing follower lists on Twitch.
Twitch TrackerTool for tracking Twitch statistics and analytics.
Sully GnomeTool for analyzing Twitch stream statistics.
Twitch Stream FilterTool for filtering and previewing Twitch streams.
Untwitch.comTool for downloading Twitch videos.
Twitch OverlapTool for analyzing viewer overlap between Twitch streamers.
JustlogTool for viewing Twitch chat logs.
Twitch RecoverTool for recovering deleted Twitch videos.
Twitch DatabaseDatabase for tracking Twitch followings.
Twitch InsightsTool for analyzing Twitch trends and statistics.
Twitch Followage ToolTool for checking how long users have been following a Twitch channel.

1.7.7 Tinder

ToolsDescription
BadooSocial discovery and dating app.
BumbleDating app where women make the first move.
Coffee Meets BagelDating app that curates matches for users.
eHarmonyDating site focused on long-term relationships.
GrindrSocial networking app for gay, bi, trans, and queer people.
happnDating app that shows users people they've crossed paths with.
HERDating and social app for LGBTQ+ women and non-binary people.
HeybabyDating app for single parents and those open to dating them.
HingeDating app designed to be deleted.
The Inner CircleExclusive dating app for ambitious professionals.
The LeagueDating app for professionals.
Match.comOne of the largest dating sites.
MeetMeSocial discovery app for meeting new people.
OkCupidDating app with a detailed questionnaire for matching.
Plenty of FishDating site with a large user base.
ScruffSocial app for gay, bi, trans, and queer people.
TastebudsDating app that matches people based on music taste.
TinderPopular dating app for meeting new people.
zooskDating site with a behavioral matchmaking algorithm.

1.7.8 Reddit

ToolsDescription
snscrapeCommand-line tool for scraping social media posts.
RedectiveOSINT tool for analyzing Reddit user activity.
KnewKarmaReddit analytics and visualization tool.
RedditPostSleuthTool for investigating and analyzing Reddit posts.

1.7.9 Telegram

ToolsDescription
telegram-checkerA Python tool for checking Telegram accounts via phone numbers or usernames. Automatically verifies account existence, downloads profile pictures, and provides detailed user information in a clean JSON format. Built with Telethon API for reliable Telegram interaction.

2. Pentesting

2.1 Post Explotation

ToolsDescription
EmpireA post exploitation framework for powershell and python.
SilentrinityA post exploitation tool that uses iron python to get past powershell restrictions.
PowerSploitA PowerShell post exploitation framework.
ebowlaFramework for Making Environmental Keyed Payloads.

2.2 Deobfuscators

ToolsDescription
JS NiceWeb service guessing JS variables names and types based on the model derived from open source.
de4dot.NET deobfuscator and unpacker.

2.3 Decompilers

ToolsDescription
uncompyle6Decompiler for the over 20 releases and 20 years of CPython.
HopperA OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables.
KarkatauThe best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
dnSpy.NET assembly editor, decompiler, and debugger
ILSpyAn open-source .NET assembly browser and decompiler
DotPeekA free-of-charge .NET decompiler from JetBrains
JADXDecompiler for Android apps. Not related to JAD.
JADJAD Java Decompiler (closed-source, unmaintained)
LuytenOne of the best, though a bit slow, hangs on some binaries and not very well maintained.
R2DecDecompiler plugin for radare2
DecaiLLM-based decompiler for radare2
BinaryNinjaBinary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform built by reverse engineers, for reverse engineers.
apktoolA tool for reverse engineering Android apk files
ProcyonProcyon java decompiler - Procyon is a binary star system in Canis Minor

2.4 Disassembler and debuggers

ToolsDescription
IDAMulti-platform disassembler and debugger for Windows, Linux, and macOS.
Olly32-bit assembler-level debugging tool for Windows.
plasmaInteractive disassembler for x86, ARM, and MIPS, with indented pseudo-code and syntax coloring.
radare2Portable and versatile reverse engineering framework.
iaitoGraphical interface for the radare2 reverse engineering framework.
x64dbgOpen-source debugger for x64 and x32 applications on Windows.
ScratchABitCustomizable and hackable disassembler with support for IDAPython-compatible plugins.
GhidraComprehensive reverse engineering suite developed by the NSA.

2.5 Web

WebDescription
CyberbroA simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services (API and scraping).
recon-ngWeb reconnaissance framework for gathering OSINT.
KatanaA web reconnaissance tool, recognized for web crawling and spidering.
WaybackurlsA tool for extracting historical URLs from the Wayback Machine, helping to discover hidden or outdated web resources.
SpySeData gathering service offering detailed information on IPs, domains, ports, technologies, and more through OSINT.
Git-ScannerTool for bug hunting or penetration testing to find exposed .git repositories.
KeyscopeKey and secret auditing tool that checks secrets against multiple SaaS platforms.
VHostScanVirtual host scanner that performs reverse lookups and detects dynamic default pages, aliases, and catch-all configurations.
ShodanSearch engine for finding servers and devices connected to the internet.
SubFinderTool for discovering valid subdomains through passive online sources.
sqlmapAutomatic SQL injection tool for database takeover.
URLVoidWebsite reputation checker that scans URLs for safety using multiple security engines and blocklists.
GobusterGobuster is a fast and efficient tool used in penetration testing and ethical hacking for discovering hidden directories, files, DNS subdomains, and virtual hostnames on a web server. It works by brute-forcing web server paths or subdomains using wordlists.
FfufAn alternative for fast web fuzzing based on Golang, used for discovering hidden files, directories, sub-domains, VHosts and resources by brute-forcing URL paths.
HttpxA fast and efficient multi-purpose tool for probing and discovering HTTP-based services, performing various checks like SSL/TLS, redirects, and more.
SecListsSeclist is a depository full if word list I use it for Gobuster and other brute forcing aapplications. It has a variety of wordlists for your needs of small wordlists to large wordlists.
Burp SuiteA powerful GUI based integrated platform for web application security testing, offering tools for intercepting traffic, scanning vulnerabilities, brute-forcing and exploiting security flaws.
HExHTTPTool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors.
403JUMPTool designed for penetration testers and bug bounty hunters to audit the security of web applications
0BL1V10N CVE-2024-25600 (Bricks Builder Plugin Exploit)Exploit for CVE-2024-25600 in Bricks Builder (WordPress). Developed for TryHackMe’s Bricks Heist room. Enhanced from Tornad0007. From OD&H
SubdomainRadarAll-in-one recon platform: 50+ data sources for subdomain discovery, port & vulnerability scans, screenshots, and API access

2.6 Network

ToolsDescription
NetworkMinerNetwork Forensic Analysis Tool (NFAT) for analyzing network traffic.
ParosJava-based HTTP/HTTPS proxy for web application vulnerability assessment.
pigLinux-based packet crafting tool.
cirt-fuzzerSimple TCP/UDP protocol fuzzer for vulnerability testing.
ASlookupTool for exploring autonomous systems with related data (CIDR, ASN, Org).
ZAPIntegrated penetration testing tool for identifying vulnerabilities in web applications.
mitmsocks4jMan-in-the-middle SOCKS proxy for Java.
ssh-mitmSSH/SFTP man-in-the-middle tool for logging sessions and passwords.
nmapSecurity scanner for network exploration and vulnerability scanning.
NipeScript to route traffic through the Tor network.
HabuPython toolkit for network hacking.
Wifi JammerProgram to jam all Wi-Fi clients in range.
FiresheepHTTP session hijacking attack tool.
ScapyPython tool for creating and manipulating network packets.
AmassSubdomain enumeration tool with scraping, brute forcing, crawling, and reverse DNS capabilities.
sniffglueMultithreaded secure packet sniffer.
VulertVulert secures software by detecting vulnerabilities in open-source dependencies—without accessing your code. It supports Js, PHP, Java, Python, and more.
NetzTool for discovering internet-wide misconfigurations using zgrab2.
RustScanFast port scanner using Rust, designed for quick scanning and integration with Nmap.
PETEPExtensible TCP/UDP proxy for traffic analysis and modification with SSL/TLS support.
TorCrawlPython-based tool to crawl .onion websites efficiently.
Midnight SeaA dark web crawler designed for flexibility and integration with analysis tools.
WiresharkA network protocol analyzer for capturing and analyzing network packets.
BettercapA powerful tool for man-in-the-middle attacks, network sniffing, and WiFi exploitation.
EttercapA comprehensive suite for man-in-the-middle attacks on LANs and WiFi networks.
KismetA wireless network detector, sniffer, and intrusion detection system.
TcpdumpA command-line packet analyzer for capturing and analyzing network traffic.
NetcatA networking utility for reading and writing data across networks, often used for debugging.
CrackMapExecA post-exploitation tool for pentesters to automate common tasks against networks.
Burp SuiteA comprehensive suite for web application security testing, including WiFi-related vulnerabilities.
ResponderA tool for poisoning network traffic and conducting man-in-the-middle attacks.
SSLstripA tool that downgrades HTTPS connections to HTTP, enabling interception of traffic.
dnschefA DNS proxy tool that allows for DNS manipulation and phishing attacks.
FierceA domain scanner tool for DNS reconnaissance, useful for network mapping.
MitMA man-in-the-middle framework for intercepting, modifying, and injecting traffic.
HTTP ToolkitHTTP Toolkit is an open-source tool for debugging, testing and building with HTTP on Windows, Linux & Mac. 1 click setup for rooted devices.
SniffnetApplication to comfortably monitor your internet or traffic.
Uptime-KumaA fancy self-hosted monitoring tool.
Nope ProxyNope is a non-http (TCP and UDP) proxy extension for burp suite. Nope has a built in DNS, port monitor, scripting engine, and proxies for row TCP and UDP sockets.
Pentest Collaboration FrameworkOpensource, cross-platform and portable toolkit for automating routine processes when carrying out various works for testing!
NetHawkAn AI-powered tool for ethical hacking and network vulnerability assessment, simplifying deep scans and security audits for professionals.
Windows Network CPRA desperate cry for help disguised as a script. Built for Windows users still pretending their OS knows how networking works. This tool slaps your connection until it behaves — because sometimes, brute force is the only language Microsoft understands. If your IP starts with 169.254, just run this and pray.

2.7 RFID

ToolDescription
Proxmark3A powerful tool for reading, writing, and analyzing RFID and NFC cards.
ChameleonMiniAn RFID emulator for security analysis.
Flipper ZeroA versatile multi-tool device for interacting with RFID, NFC, and other protocols.
ACR122UA USB-based NFC reader and writer commonly used for RFID development and testing.
LibNFCAn open-source library for using NFC readers and performing RFID interactions.
MIFARE Classic Tool (MCT)A mobile app for interacting with MIFARE Classic cards, reading, writing, and analyzing their data.
CardpeekA tool for analyzing smart cards, including Calypso-based transit cards, with a focus on data parsing and visualization.
MetrodroidA mobile app for reading and analyzing transit cards, providing insights into metro card data.
MetroflipA Flipper Zero app for reading and parsing metro cards, inspired by Metrodroid. It supports multi-protocol card reading and global transit card analysis.
SeaderA Flipper Zero application to interface with a SAM from the Flipper Zero over UART
NFC MagicA Flipper zero application for writing to NFC tags with modifiable sector 0
MFOCMFOC is an open source implementation of "offline nested" attack
PicoPassApp to communicate with NFC tags using the PicoPass(iClass) format.
Mifare FuzzerApp emulates Mifare Classic cards with various UIDs to check how reader reacts on them.
MFKeyMIFARE Classic key recovery tool.

2.8 WiFi

ToolsDescription
Aireplay-ngA tool for injecting frames into a wireless network to manipulate traffic.
Aircrack-ngA suite of tools for cracking WEP and WPA-PSK encryption keys.
Airmon-ngA tool to configure wireless interfaces into monitor mode for packet capture.
Airolib-ngA tool to create and manage a database for cracking WPA/WPA2 networks.
AiregeddonA multi-purpose WiFi hacking tool focused on WPA/WPA2 PSK networks.
WashA tool to identify routers that are vulnerable to WPS attacks.
ReaverA tool designed to crack WPS PINs of routers to gain access to WPA networks.
BullyA tool for brute-forcing WPS PINs of vulnerable routers.
Airbase-ngA tool to create fake access points for testing and social engineering attacks.
Fern WiFi CrackerA GUI-based tool to crack WEP/WPA/WPS encryption on wireless networks.
WifiteA tool for automating the cracking of WEP and WPA networks.
WifiphisherA tool for phishing attacks targeting WiFi networks and capturing credentials.
Ghost PhisherA phishing tool that creates fake access points and social engineering attacks.
XenoXeno is a wifi pentesting tool designed to show you vulnerabilities in your network.

2.9 Bluetooth

ToolsDescription
BlueToolkitBlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices.
BluelogBluelog is a Bluetooth device discovery tool designed to detect nearby Bluetooth devices and log their information.
BluerangerBlueranger is a Bluetooth reconnaissance tool used to find and map Bluetooth devices within range.
BTScannerBTScanner is a fast Bluetooth scanner that discovers devices and services, making it useful for penetration testing.
UBERTOOTHUBERTOOTH is a hardware-based Bluetooth analysis and interception tool, capable of monitoring Bluetooth communications.
GATTackerGATTacker is a Python-based tool for attacking GATT (Generic Attribute Profile) services on BLE devices.
btlejuicebtlejuice is a man-in-the-middle attack proxy for BLE communications, allowing interception and manipulation of BLE traffic.
crackleCrackle is a tool designed to crack Bluetooth pairing keys, helping to test the security of Bluetooth connections.
spooftoophSpooftooph is a Bluetooth spoofing tool that can impersonate other Bluetooth devices, useful for social engineering attacks.
bluemahoBluemaho is a Bluetooth vulnerability assessment tool that performs various attacks such as BlueSmack and L2CAP ping-of-death.
bluepotBluePot is a Bluetooth honeypot that simulates vulnerable Bluetooth devices to capture attacks and gather intelligence.
blueranger-ngBlueranger-ng is an updated version of Blueranger, enhancing Bluetooth reconnaissance capabilities.
bluesnarferBluesnarfer is a tool used to exploit the OBEX protocol, allowing unauthorized access to files on Bluetooth devices.
bluedivingBluediving is a Bluetooth LE security assessment tool that provides functionality for scanning, connecting, and interacting with BLE devices.

2.10 Reconnaissance

ToolDescription
NmapA network scanning tool used for discovering hosts, services, and vulnerabilities on a network.
NetcatA versatile networking tool used for port scanning, banner grabbing, and transferring files.
WiresharkA network protocol analyzer that captures and inspects network packets in real-time.
FierceA domain scanner that helps map out a target’s domain infrastructure, including DNS records and subdomains.
Recon-ngA web-based reconnaissance framework that automates OSINT gathering from various sources.
TheHarvesterA tool to gather email addresses, subdomains, and other information through search engines and public records.
MasscanA fast network scanner used for scanning large IP ranges to identify open ports.
DigA command-line tool for querying DNS records and gathering information on domain names.
Sublist3rA tool for discovering subdomains using open-source intelligence.
CensysProvides data on devices, services, and open ports exposed to the internet, assisting in reconnaissance.
ShodanA search engine that scans and indexes devices connected to the internet for reconnaissance.
SpiderFootAn automation tool for gathering intelligence about a target by querying public databases and sources.
DnsreconA tool for DNS enumeration, identifying subdomains, and extracting other DNS-related data.
Enum4linuxA tool to gather information from Windows machines by querying SMB shares and services.
EnumeRanndenThis tool is designed to streamline and enhance your penetration testing workflow by integrating a variety of essential tools and functionalities into a single script.
ProwlerProwler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more.
NucleiNuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud configurations.

2.11 Bug Bounty

ToolDescription
123Contact FormA versatile form builder for websites and mobile applications.
99designsA platform to connect designers with clients needing logos, websites, and more.
AbacusA tool for simplifying expense reporting and tracking for businesses.
AcquiaCloud-based solutions for managing and optimizing digital experiences on Drupal.
ActiveCampaignA customer experience automation platform for email marketing and CRM.
ActiveProspectA SaaS platform to automate lead acquisition and qualification processes.
AdobeIndustry-leading software solutions for creative professionals, including Photoshop and Acrobat.
AeroFSA private cloud collaboration tool for secure team file sharing.
AirbitzA secure Bitcoin wallet and platform for decentralized applications.
AirbnbA platform for booking short-term homestays and unique travel experiences.
AlgoliaA search and discovery API for websites and mobile applications.
AltervistaA platform for creating free blogs and websites with monetization options.
AltroconsumoItaly's largest consumer organization offering product reviews and advice.
AmaraA tool for creating and managing subtitles for videos collaboratively.
Amazon Web ServicesA comprehensive cloud platform offering computing power, storage, and other services.
Amazon.comThe world's largest online retailer offering a vast array of products and services.
ANCILE Solutions Inc.Solutions for creating and delivering on-demand learning and performance support.
AnghamiA music streaming platform focused on Arabic content.
ANXBTCA Bitcoin trading and exchange platform.
Apache httpdAn open-source HTTP server for hosting websites and applications.
AppceleratorA cross-platform mobile app development tool.
AppleA global leader in consumer electronics, software, and online services.
ApptentiveA platform for mobile app engagement and customer feedback.
AptibleA security and compliance platform for DevOps teams.
ArdourA digital audio workstation for recording, editing, and mixing sound.
ArkaneA blockchain wallet and API service for developers.
ARM mbedA platform for IoT device development and deployment.
AsanaA project management tool for team collaboration and task tracking.
YesWeHackA global bug bounty and vulnerability disclosure platform.
intigritiA leading European platform for crowdsourced security testing.
HackerOneA vulnerability coordination and bug bounty platform connecting businesses with hackers.
BugcrowdA platform offering managed bug bounty programs and vulnerability disclosure.
CobaltA pen-testing as a service platform with a global community of security experts.
BountysourceA funding platform for open-source projects and software development bounties.
Bounty FactoryA platform for launching bug bounty programs with a community of ethical hackers.
BMW Group Bug BountyThe security of our products and services is top priority for us
Coder BountyA platform for developers to earn rewards by solving coding challenges.
FreedomSponsorsA funding platform for open-source software improvements and bug fixes.
FOSS FactoryA platform for funding free and open-source software development.
SynackA crowdsourced security platform combining automation with a network of ethical hackers.
HackenProofA bug bounty and vulnerability coordination platform for businesses.
DetectifyA SaaS platform offering web vulnerability scanning and crowdsourced security.
BugbountyjpA Japanese platform for launching and managing bug bounty programs.
SafehatsA vulnerability coordination platform for organizations to work with ethical hackers.
BugbountyHQA community platform for ethical hackers to collaborate and find bug bounty opportunities.
HackerhiveA security platform for crowdsourced vulnerability assessments and bug bounties.
HacktrophyA Slovak bug bounty platform for finding vulnerabilities in digital assets.
AntiHACKA bug bounty and penetration testing platform based in Asia.
CESPPAA cybersecurity and bug bounty platform for coordinated vulnerability disclosure.
Bug Bounty HuntingBug Bounty Hunting Search Engine
exifharvesterAutomatic tool for extracting EXIF metadata from website images and sets of URLs. A perfect tool for bug hunters and OSINT researchers.
Ripper Web Content - Capture Metadata ContentExtension that analyses and extracts metadata from content found on the web.
gfA wrapper around grep, to help you grep for things.

2.12 Binary Explotation

ToolDescription
NightmareNightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges. I call it that because it's a lot of people's nightmare to get hit by weaponized 0 days, which these skills directly translate into doing that type of work.
pwntoolsCTF framework and exploit development library
gefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Angrangr is an open-source binary analysis platform for Python. It combines both static and dynamic symbolic ("concolic") analysis, providing tools to solve a variety of tasks.

2.13 CCTV

ToolDescription
HackCCTVPython Script for CCTV around the world.

3. Cryptography

3.1 Cryptography

ToolsDescription
xortoolA tool to analyze multi-byte XOR cipher
John the RipperA fast password cracker
AircrackAircrack is 802.11 WEP and WPA-PSK keys cracking program.
CipheyAutomated decryption tool using artificial intelligence & natural language processing.
CyberchefA powerful web-based tool for encoding, decoding, encryption, and data analysis
Don´t Leak My FileDocument leak protection application developed in Python. It uses AES-256 encrypted watermarks and database tracking to detect potential leaks.
SkyCryptSkyCrypt is a file encryption and decryption application developed in Python. It uses the AES-256 algorithm to securely encrypt files and generates a one-time password (OTP) to validate decryption.

3.2 Steganographic

ToolsDescription
110 steganographic toolsA comprehensive list of 110 steganographic tools.
CloakifyA tool for disguising data to bypass data loss prevention mechanisms.
Stego_DropperA steganography-based dropper written in Python.
silenteyeA cross-platform application for steganography.
deep-stegDeep learning based steganography tool.
StegXA Python-based steganography tool.
js-stegA steganography tool using JavaScript.
stegA simple steganography tool.
StegoProxyA proxy tool that implements steganography.
Video-Steganography-for-Piracy-PreventionA video steganography tool to prevent piracy.
openstegoAn open-source steganography tool.
stegAnother steganography tool.
StegbookA steganography tool for Facebook messages.
PDF_steganographyA tool for hiding data within PDF files.
steganography_talkA presentation on steganography.
ascii-steganographyA tool for hiding data within ASCII text.
voicesA tool for audio steganography.
stego-retweetA tool for hiding data within retweets.
ARMSAnother steganography tool.
stegosaurusA simple steganography tool.
OutguessA universal steganography tool.
BitStegNetA neural network based steganography tool.
stego-waveA steganography tool for hiding data in audio files.
StegoMP3A tool for MP3 steganography.
jSteganographiXA steganography tool written in Java.
LSB-SteganographyA tool for least significant bit steganography.
jstegA steganography tool written in Go.
stego-toolkitA collection of steganography tools.
f5-steganographyAn implementation of the F5 steganography algorithm.
MatroschkaA steganography tool.
Deep-SteganographyA deep learning based steganography tool.
AudioStegoA tool for audio steganography.
audio-steganography-algorithmsAlgorithms for audio steganography.
jphsA steganography tool.
StegDroidA steganography tool for Android.
SteCoStegA steganography tool.
PNG-MaskA tool for hiding data in PNG images.
chess-stegA steganography tool for hiding data in chess games.
strogonoffAnother steganography tool.
PictographA steganography tool for images.
stegoVeritasA steganography tool.
secretbookA steganography tool for Facebook messages.
snow10A steganography tool.
mp3stegoA tool for MP3 steganography.
stego_videoA video steganography tool.
diitA steganography tool.
stegosploitA tool for embedding exploits in images.
stegolabA steganography tool.
stego-book-2014A collection of steganography tools from 2014.
timeshifterA tool for covert channels based on time.
coverteleA tool for covert communication.
CCEAPA steganography tool.
cloud-covert-channelsA tool for covert channels in the cloud.
DNSExfiltratorA tool for data exfiltration via DNS.
StegPageA source for various steganography tools.
CameraShyA steganography tool.
stegUnicodeA steganography tool using Unicode.
stelinAnother steganography tool.
HydanA steganography tool for binary files.
deogolA steganography tool.
Hugo source codeSource code for a steganography tool.
WOWSteganography algorithms.
stegifyA simple steganography tool.
Steganography 101An introductory guide to steganography.
Invoke-PSImageA tool for embedding PowerShell scripts in images.
instegogramA tool for steganography in Instagram images.

3.3 Steganalysis

ToolDescription
VSLA steganographic tool that helps in hiding and detecting messages within digital images.
HackTricks - Stego TricksA comprehensive guide on various steganography techniques and tricks used in cybersecurity.
zstegA tool for detecting hidden data in PNG and BMP files.
StegOnlineAn online tool for hiding and extracting hidden messages in images.
StegsolveA steganography analysis tool that can analyze images for hidden data.
StegCrackerA tool for brute-forcing passwords of hidden data in steganographic images.
StegSeekA lightning-fast steganography brute-force tool for hidden data in images.
JJTC SteganalysisA resource for various steganalysis techniques and tools.
Guillermito's SteganographyAn informative site on steganography tools and techniques.
StegdetectA popular steganography detection tool capable of detecting hidden data in images.
Spy HunterA tool designed to detect steganography usage and hidden data.
StegkitA steganography kit used for hiding and extracting hidden messages in images.
StegalyzerA tool designed for detecting and analyzing steganographic content in digital images.
Stego SuiteA suite of tools for hiding and detecting steganographic content.
StegsecretAn open-source steganography tool for embedding and extracting hidden messages in images.
StegExposeA tool for detecting hidden data in images using statistical analysis.
Cryptonibbles - Mr. Robot SteganographyA blog post discussing steganography in the context of the TV show Mr. Robot.
Forensics Analysis of Video Steganography ToolsA research paper on forensic analysis of video steganography tools.
AletheiaA tool for image steganalysis using state-of-the-art machine learning techniques.
Danielle Lerch's PapersA collection of research papers on steganalysis and related topics.
Steganalysis with CNN for Same Key ImagesA project for steganalysis using convolutional neural networks (CNN) for same key images.
DeepStegDeepsteg performs visual, structural, and statistical attacks (including deep learning-based attacks) to detect files hidden within images and other files.
tf_audio_steganalysisA project for steganalysis of audio files using TensorFlow.
SteganalysisCNNA steganalysis project using convolutional neural networks (CNN).
ALASKAA large-scale image steganalysis dataset.
IStego100KA large-scale image steganalysis dataset.
StegOnlineAn online tool for hiding and extracting hidden messages in images.
SteganabaraA tool for steganography analysis.
StegasawusA steganography analysis tool.
UDSSA project for universal deep steganalysis systems.
BreakingSteganalysisGANA project on breaking steganalysis using generative adversarial networks (GAN).
SteganalyseA steganalysis tool.
StegCrackerA tool for brute-forcing passwords of hidden data in steganographic images.
Welloganography SolverA steganography analysis tool.
McAfee Free Tools - SteganographyA collection of free steganography tools provided by McAfee.
MisticaA steganography analysis tool.
Cookie StegoA steganography tool for hiding and extracting hidden messages in images.
AperiSolveA steganography analysis tool.
SteganalysisA steganalysis project.
YeNet-PytorchA project for steganalysis using YeNet and PyTorch.
Steganalysis with CNN - Yedroudj-NetA steganalysis project using convolutional neural networks (CNN) - Yedroudj-Net.
Pytorch implementation of SRNetA project for steganalysis using SRNet and PyTorch.
LSB ToolkitA toolkit for steganography using least significant bit (LSB) techniques.
CAECNNcodeA project for steganalysis using convolutional neural networks (CNN).
StegolabA steganography and steganalysis toolkit.
DL SteganalysisA project for steganalysis using deep learning techniques.
Audio SteganalysisA project for steganalysis of audio files.
Audio Steganalysis CNNA project for steganalysis of audio files using convolutional neural networks (CNN).
DeepStegA steganalysis tool for detecting hidden data in images using deep learning techniques.
Stegasaurus2A steganography analysis tool.
StegaToolkitStenography tool with web interface.

4. Forensic & Malware Analysis

4.1 Forensic

ToolsDescription
AutopsyDigital forensics platform and graphical interface for The Sleuth Kit and other tools.
sleuthkitA collection of command-line digital forensics tools and library.
EnCaseSuite of digital investigation products by Guidance Software.
malzillaMalware hunting tool for analysis and detection.
IPED - Indexador e Processador de Evidências DigitaisBrazilian Federal Police forensic investigation tool.
CyLRNTFS forensic image collector for forensic investigations.
CAINEUbuntu-based tool that provides a complete forensic environment with a graphical interface.
VolatilityFramework for memory forensics and analysis of volatile memory.
RedlineHost investigation and data acquisition tool.
REKALLMemory analysis and forensics framework.
Log2Timeline (Plaso)Tool for creating timelines for forensic analysis.
Cyber TriageAutomated DFIR software for investigating malware, ransomware, and account takeovers.
DumpzillaTool to extract forensic data from Firefox, Iceweasel, and Seamonkey browsers.
DFTimewolfFramework for orchestrating forensic collection, processing, and export.
IPED Digital Forensic ToolOpen-source tool for analyzing disk images and file systems.
Volatility 3Framework for extracting data from volatile memory for system state analysis.
Binalyze AIRDigital forensics platform for comprehensive incident response.
TestDiskData recovery software for recovering lost partitions and undeleting files.
WinHexUniversal hex editor for forensics, data recovery, and IT security tasks.
SkadiOpen-source tools for forensic artifact and image analysis.
HoarderTool for collecting and parsing Windows artifacts for digital forensics.
libregfLibrary for accessing and parsing Windows NT Registry files.
Radare2Powerful framework for reverse engineering and binary analysis.
Silk GuardianAnti-forensic Linux kernel module that acts as a USB port kill-switch.
evtkitTool for fixing acquired Windows Event Log files.
Pancake ViewerDFVFS-backed viewer for file extraction and viewing.
Mobile Verification Toolkit (MVT)Forensic tool for gathering traces from Android and iOS devices.
TurbiniaFramework for automating forensic processing in cloud environments.
Belkasoft Evidence CenterComprehensive digital forensics and incident response platform.
libevtLibrary for parsing Windows Event Logs for forensic analysis.
SherloqAn open-source digital image forensic toolset.
KuiperKuiper is a digital investigation platform that provides a capabilities for the investigation team and individuals to parse, search, visualize collected evidences.
RegRipper4.0The key tool for forensic analysis of Windows DAT.
RecuvaRecover your deleted files quickly and easily. Accidentally deleted an important file? Lost files after a computer crash? No problem - Recuva recovers files from your Windows computer, recycle bin, digital camera card, or MP3 player!
EaseUSFree Data Recovery Software Recover up to 2GB data for free on Windows 11/10/8/7
PhotoRecPhotoRec is file data recovery software designed to recover lost files including video, documents and archives from hard disks (Mechanical Hard drives, Solid State Drives...), CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory.
Forensic ToolsA Collection of forensic tools

4.2 Hex editors

ToolsDescription
HxDA hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
WinHexA hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
wxHexEditor
Synalize It
Hexinator
010 EditorEdit text files, XML, HTML, Unicode and UTF-8 files, C/C++ source code, PHP, etc. Unlimited undo and powerful editing and scripting tools.
ImHexA Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM. Fully free.

4.3 Execution logging and tracing

ToolsDescription
WiresharkA free and open-source packet analyzer for network protocol analysis.
tcpdumpA powerful command-line packet analyzer, along with libpcap for network traffic capture.
mitmproxyAn interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface.
Charles ProxyA cross-platform GUI web debugging proxy for viewing intercepted HTTP and HTTPS/SSL live traffic.
usbmonUSB capture tool for Linux, used for monitoring USB traffic.
USBPcapUSB capture tool for Windows, useful for monitoring USB traffic.
dynStructA tool for structure recovery via dynamic instrumentation.
drltraceA tool for tracing shared library calls.
Research on CMSTP.exeDetailed research on using CMSTP.exe for bypassing security restrictions and executing arbitrary code.
Windows oneliners to download remote payload and execute arbitrary codeExplains one-liner PowerShell commands for downloading and executing malicious payloads.
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic ScriptsDemonstrates techniques for bypassing AppLocker and executing commands with PowerShell diagnostic scripts.
WSH Injection: A Case StudyA case study on exploiting Windows Script Host (WSH) injection for command execution.
Gscript DropperIntroduction to using Gscript as a dropper tool in red team operations.

4.4 Malware Analysis

ToolDescription
YabinCreates Yara signatures from malware to identify similar samples.
Any RunInteractive malware sandbox for real-time analysis and threat intelligence.
BluepotBluetooth honeypot for monitoring and capturing malicious activity.
Elastic Security YARA RulesSignature-based YARA rules for detecting threats across multiple platforms.
YARA-SignatorAutomatically generates YARA rules for malware repositories.
MalSharePlatform for uploading, searching, and downloading malware samples.
The DFIR ReportIn-depth threat intelligence reports and services.
Mobile AuditSAST and malware analysis tool for Android APKs.
MastiffStatic analysis framework for extracting key characteristics from files.
MalheurTool for automatic analysis of malware behavior using machine learning.
PyaraScannerMultithreaded YARA scanner for incident response or malware zoos.
Static File Analyzer (SFA)A deep analysis tool for malicious files using ClamAV and YARA rules.
Yara DecompressorTool to decompress malware samples for running YARA rules.
ShotgunyaraGenerates YARA rules for various string and encoded malware variations.
VxSigAutomatically generates AV byte signatures for similar binaries.
Hybrid-AnalysisProvides in-depth static and dynamic analysis of files.
Findom-XSSA simple DOM-based XSS vulnerability scanner.
DalfoxPowerful open-source XSS scanner for automation.
PyLibEmuPython wrapper for Libemu for shellcode analysis.
Yara StationManagement portal for LoKi scanner with a centralized database.
NodeYaraYara module for Node.js for scanning with Yara rules.
Malware Traffic AnalysisAnalyzes malicious network traffic to detect malware activity.
Yara-RustYara bindings for Rust supporting various features like rule compilation.
Yara Rule GeneratorA tool for creating YARA rules quickly to isolate malware families.
StringSifterA machine learning tool for ranking strings for malware analysis.
InlyseAI-based IT security platform for identifying and stopping advanced malware.
yarGenGenerates YARA rules by extracting strings from malware files.
Cuckoo SandboxAutomated malware analysis and detection in an isolated environment.
Vaya-Ciego-NenTool to detect and exploit Blind XSS vulnerabilities.
BruteXSSFinds Cross-Site Scripting (XSS) vulnerabilities in web applications.
FindsploitInstantly find exploits from local and online databases.
xssor2Tool for testing and exploiting XSS vulnerabilities.
CFRJava decompiler supporting features up to Java 14.
ReFlutterFramework for reverse engineering Flutter apps.
Dwarf DebuggerA debugger for reverse engineers and security analysts.
TritonDynamic binary analysis library with emulation capabilities.
KlaraDistributed Python system to help hunt for new malware using Yara rules.
Android Malware SandboxSandbox for analyzing Android malware.
Fabric PlatformAutomates cybersecurity reporting with open-source tools and templates.
WizCloud-native security platform for detecting and preventing security threats.
XSSConA simple XSS scanner for detecting vulnerabilities.
GitHunterSearches Git repositories for sensitive data.
jwt-key-id-injectorPython script to test for JWT vulnerabilities.
qsfuzzFuzzes query strings to identify security vulnerabilities.
Weaponised-XSS-payloadsA collection of XSS payloads for exploiting web vulnerabilities.
XSSorA tool for exploiting and testing XSS vulnerabilities in web apps.
ReClassA reverse engineering tool for Windows executable analysis.
MalwoverMalware detection and prevention for advanced cyber threats.
OdinMalware analysis platform with advanced threat detection.
DistributeMalware analysis tool that helps distribute files for analysis.
YaraStationManagement portal for Yara rule-based malware scanning.
CAPEMalware sandbox designed for executing and analyzing malicious files.
Sandboxie-PlusAnother Malaware sandbox and might be a better option if your testing runs.
Hybrid-AnalysisHybrid Analysis is a Malaware analysis service it's free and has ai or someone does it for free it's reliable and more accurate than total virus.

5. Anonymity and Security Tools

5.1 Delete Your Trace

ToolDescription
RedactDelete all you comments, likes... of your social acounts.
DeleteMeDelete your information on all your accounts.
incogniDelete your information of databrokers.
JustDeleteMeDelete your accounts.

5.2 Password Managers

ResourcePriceDescription
KeepassFreeAvailable on windows, linux, mac, IOS and Android.
BitwardenFreemiumA password manager that securely stores manages and syncs credentials across any browsers or devices.
LastPassFreeSimplify your digital life with a password manager that automatically creates, saves, and fills strong passwords.

5.3 VPNs

ResourceDescription
Mullvad VPNA privacy-focused VPN service that offers anonymous internet browsing with no personal information required for registration.
Proton VPNA secure VPN service that prioritizes privacy, offering both free and premium plans with strong encryption and no-logs policy.
IVPNA privacy-focused VPN service offering strong encryption, a strict no-logs policy, and advanced features like multi-hop VPN for enhanced security.
UltrasurfA popular anti-censorship program developed by a small group of Silicon Valley engineers to promote free information exchange. It allows users to bypass internet censorship for free.
PsiphonA censorship circumvention solution that provides fast, easy, and open access to the internet. It also explores new areas to protect user privacy and freedom.
CactusVPNA VPN service designed to protect user privacy and provide secure internet access.
VPN over DNSA unique service that tunnels internet traffic through DNS queries to bypass restrictions and enhance privacy.

5.4 Privacy and Anonymity

ToolDescription
Digital DefenseAssessment of data security and privacy.
Privacy.netEvaluation of the information collected by websites.
Cover Your TracksBrowser privacy test.
Do I LeakTest for trackable traffic and data.
DeviceInfo.meBrowser security test.
BrowserLeaksTesting tools to evaluate security and privacy.
AmiUniqueStudy of browser fingerprints.
TresoritSecure cloud storage and encryption solution.
Dark Web Exposure and Phishing Detection TestMonitor and detect your Dark Web exposure, phishing and domain squatting.
ExtensionBrowser Ulock-SecurityBrowser extension that acts as your personal guardian against phishing and malicius links.
anon.liPrivate email aliases & end-to-end encrypted file sharing (up to 250GB)

6. Utility & Miscellaneous

6.1 Utility

ToolDescription
Hashcat Pass RecoveryPassword recovery utility for cracking hashes.
BrowserLeaksSuite of tools to test the security and privacy of your web browser.
Hudson RockCheck if your email address or domain was compromised in global Infostealer malware attacks
CavalierGPT - The First Comprehensive Infostealers AI BotCavalierGPT retrieves and curates information from various Hudson Rock endpoints, enabling investigators to delve deeper into cybersecurity threats with unprecedented ease and efficiency.
Gravwell Community EditionFull featured unstructured log SIEM/Security Data Lake with raw binary/pcap support
VigilantOnionCrawls and monitors .onion sites for specified keywords or changes.
OnionIngestorGathers data from Tor hidden services for analysis or intelligence purposes.
DumpsterDiverDumpsterDiver is a tool, which can analyze big volumes of data in search of hardcoded secrets like keys (e.g. AWS Access Key, Azure Share Key or SSH keys) or passwords.
FactionFaction is an open-source tool that automates many aspects of manual penetration testing. Faction automates pen-test reports, tracks vulnerabilities, and schedules pen-test assessments.

6.2 Miscellaneous

ToolDescription
GetAllURLs (gau)Collects existing URLs for a domain from sources like Wayback Machine, URLScan, and AlienVault.
GuardeyOffers gamified training and content for improving cybersecurity awareness.
NightShadeFramework for designing and executing CTF challenges with a focus on security.
Smali/Baksmali mode for EmacsImproves Emacs usability for reading Smali code, aiding Android reverse engineering.
Ctf-writeupsDetailed explanations and solutions for Capture the Flag (CTF) challenges.
Secrets of a High Performance Security-Focused Agile TeamBest practices for incorporating security into agile development processes.
Dalvik OpcodesA guide to Dalvik VM instructions, useful for analyzing Android applications.
AWS ConfigEvaluates and audits AWS resource configurations for compliance and security.
DeepDarkCTICyber threat intelligence tool for monitoring and analyzing the dark web.
DroidGroundA customizable playground for Android CTF challenges.

6.3 News

ToolsDescription
WolrdEinnwesNews and search engine tools.
IT Security GuruIT Security Guru is a top resource for the latest cybersecurity news, covering threats, data breaches, and expert insights to help you stay informed and secure.

6.4 Search Engines

ToolsDescription
True People SearchSearch for people's information.
WebmiiAggregate search for personal information.
Usa-OficialOfficial USA search tools.
UssearchSearch for people in the USA.
ThatsThemComprehensive search for personal information.
Shodan SearchSearch engine for Internet-connected devices.
MaltegoTool for link analysis and data visualization.
SpiderfootAn OSINT automation tool.
Google Advanced SearchA tool to filter and refine search results based on specific needs.
Google ScholarSearch engine for scholarly articles, theses, books, and other academic resources.
BingMicrosoft's search engine with intelligent features and integrated services.
MetaGerPrivacy-focused search engine combining results from multiple indexes.
DuckDuckGoPrivacy-oriented search engine that doesn't track user activity.
StartpagePrivacy-friendly search engine offering anonymous browsing.
SwisscowsAnonymous search engine that protects user privacy and filters inappropriate content.
QwantPrivacy-respecting search engine with a European origin.
EcosiaEco-friendly search engine that uses ad revenue to plant trees worldwide.
MojeekIndependent search engine with a no-tracking policy.
Brave SearchPrivacy-centric search engine integrated with the Brave browser.
Yahoo SearchYahoo's search engine offering web, image, and video search.
BaiduChina's leading search engine.
DogpileMetasearch engine that aggregates results from multiple search engines.
Million ShortA search engine that filters out top-ranked websites for deeper web discovery.
MetaCrawler (Zoo Search)Combines results from multiple search engines into a unified format.
Carrot2Organizes search results into topic-based clusters for better navigation.
AskCombines a search engine with a news feed.
Search Engines IndexDirectory of search engines for different countries worldwide.
CachedViewsAccess cached versions of web pages from various sources.
LibGenThe largest free digital library of books.
2lingualAllows simultaneous Google searches in two languages.
IntelligenceXSearch Tor, I2P, data leaks, domains, and emails.
CensysAssessing attack surface for internet-connected devices.
Binary EdgeScans the internet for threat intelligence.
PublicWWWMarketing and affiliate marketing research.
AlienVaultExtensive threat intelligence feed.
GrayHatWarfareSearch public S3 buckets.
PolySwarmScan files and URLs for threats.
Packet Storm SecurityBrowse latest vulnerabilities and exploits.
ONYPHECollects cyber-threat intelligence data.
NetlasSearch and monitor internet-connected assets.
HunterSearch for email addresses belonging to a website.
PulsediveSearch for threat intelligence.
VulnersSearch vulnerabilities in a large database.
CRT.shSearch for certs that have been logged by CT.
SecurityTrailsExtensive DNS data.
FullHuntSearch and discovery attack surfaces.
Grep AppSearch across a half million git repos.
GreyNoiseSearch for devices connected to the internet.
DNSDumpsterSearch for DNS records quickly.
ExploitDBArchive of various exploits.
SearchCodeSearch 75 billion lines of code from 40 million projects.
LeakIXSearch publicly indexed information.
DorkSearchReally fast Google dorking.
WiGLEDatabase of wireless networks, with statistics.
URL ScanFree service to scan and analyze websites.
WayBackMachineView content from deleted websites.
DeHashedView leaked credentials.
FofaSearch for various threat intelligence.
KatanaOpen-source framework for web scanning and recon, useful for dark web investigations.
OnionSearchTool to search for .onion services across the dark web.
DarkdumpCommand-line search engine for exploring the dark web.
Ahmia Search EngineSearch engine for Tor Hidden Services on the dark web, with a public GitHub repo.
DarkusPowerful search tool designed for discovering .onion websites on the dark web.
Onion Search EngineComprehensive dark web .onion search engine with multiple Tor links available: Link 1 and Link 2.
TorBotAutomates crawling and searching for data across .onion sites.
DarcDistributed and automated .onion site crawler for large-scale data collection on the dark web.
Prying DeepAdvanced dark web crawler tailored for extracting and analyzing data from .onion sites.
Sex offenders background checkCheck for criminal records
GooglePopular search engine, useful for general OSINT investigations.
YandexRussian search engine, helpful for OSINT in Russian contexts.
MetaOSINTInteractive visualization tools for jumpstarting OSINT investigations.
File Finder · GitHubA GitHub tool for locating files and code repositories.
OSINT ToolsA collection of OSINT resources and tools.
Malfrat's OSINT MapInteractive OSINT map with categorized tools and resources.
DorkSearchTool for speeding up Google Dorking during investigations.
YouTube MetadataExtract and analyze metadata from YouTube videos.
FlightAwareReal-time flight tracking and status tool.
JetPhotosAccess a database of over 4 million aviation photos.
Black Book OnlineFree public records search tool.
Family WatchdogFree sex offender registry and other public records searches.
Background Checks.orgA guide to performing free public and criminal record searches.
BOP: Federal Bureau of PrisonsFederal inmate search and prison information.
Online Detainee Locator SystemTool for locating detainees in U.S. immigration custody.
IntelTechniques OSINT ToolA comprehensive suite of OSINT tools.
OSINT.linkDirectory of OSINT tools and resources.
SnusbaseDatabase search engine for breached data.
Cylect.ioUltimate OSINT search engine for various investigations.
DorkGPTOSINT tool for automated Google dorking and advanced searches.
ZoomEyeZoomEye is a cyberspace search engine for detailed website investigation and cybersecurity analysis.
Bug Bounty HuntingBug Bounty Hunting Search Engine
Breach DetectiveDiscover your leaked private data. Search billions of records within seconds to uncover if your data has been compromised.
Marginaila SearchOpen source search engine. No ads, no AI. "Indexing the small, old and weird web"(c) Search blogs, forums, plain text sites and more.

6.5 DNS/IP

ToolsDescription
DnsEnumMultithreaded Perl script for DNS enumeration and identifying non-contiguous IP blocks.
AmassTool for subdomain enumeration using data sources, brute force, web archives, and machine learning.
Columbus ProjectAdvanced subdomain discovery service with a fast, user-friendly API.
findsubdomainsAutomatically collects subdomains from various online sources.
MerklemapEnumerates subdomains, including hidden ones, by analyzing certificate transparency logs.
Subdomains Top 1 Million (5000)List of subdomains from the top 1 million domains, ideal for large-scale enumeration.
Shubs SubdomainsSubdomain list gathered by Shubs, valuable for reconnaissance purposes.
DNS Jhaddix ListCurated list of subdomains by Jhaddix, tailored for penetration testing.
Domain DiggerExplore DNS records, WHOIS data, SSL/TLS certificates, subdomains, and more.
DNSlyticsSearch for domain IPs, IPv4, IPv6, or associated providers.
DNSTwistScan for phishing domains and related risks.
SecurityTrailsSearch for domain names, IPs, keywords, or hostnames to assess cybersecurity risks.
InternetDBView open ports and device types linked to specific IP addresses.
GreyNoise IntelligenceIdentify internet scanners and common business activities in your security logs.
FOFAExplore internet-connected devices for reconnaissance and vulnerability analysis.
ZoomEyeA freemium tool for security reconnaissance, scanning for vulnerable devices online.
CensysAssess the attack surface of internet-connected devices and platforms.
ViewDNS.infoPerform reverse IP and Whois lookups to find hosted websites and domain owner details.
IP TrackerPerform reverse IP lookup and gather information related to the IP address.
Internet Census 2012Access service probe records from a large-scale 2012 internet scan.
ONYPHECyber defense search engine that indexes exposed assets from the internet and dark web.
IPLeakTest for leaks in your IP address, DNS, and WebRTC during online activity.
RobtexResearch IP numbers, domains, and other online assets for deeper analysis.
WappalyzerIdentify the technology stack behind any website, including CMS, e-commerce, and more.
PhotonA fast web crawler designed for OSINT (Open Source Intelligence) collection.
Technology LookupCheck which technologies a website is built with, including frameworks and tools.
BuiltWithDiscover the technologies used to build any website, from CMS to hosting platforms.
OSINT.SHA suite of OSINT tools for comprehensive information gathering.
Nmap Checker ToolAnalyze network infrastructure and devices using Nmap's powerful scanning features.
Free Network ToolsOffers network diagnostics such as traceroute, nslookup, ping, and DNS lookups.
Google Transparency ReportReports on HTTPS encryption across the web.
Certificate SearchLookup and analyze SSL certificates and their associated domains.
CRTSearch and analyze SSL certificates for cybersecurity insights.
LeakIXScan for exposed internet services and find relevant vulnerabilities.
URLScan.ioA tool to scan and analyze websites, recording all interactions during page navigation.
DNSDumpsterA free DNS research tool that identifies hosts related to a domain for security analysis.
Domain CodexPerform private investigations and legal case research, including digital piracy analysis.
SimilarWebAnalyze website traffic sources and compare competitors' online performance.
IP SearchAccess a network reputation database to find malicious IP addresses.
Reverse DomainDiscover domain names based on keyword searches.
IANA - Root Zone DatabaseProvides delegation details for top-level domains (TLDs) like .com, .uk, and more.
PunkSpiderSearch for vulnerable websites to assess security risks.
MetabigorOffers various OSINT tools without requiring an API key for access.
URLDNAGather information about URLs, such as SSL certificates, IP, and metadata.
Check-The-SumA database of malicious files, IPs, and domains collected from honeypots.
AdalancheOpen Source Active Directory ACL Visualizer and Explorer.
Wi-Fi Range and Speed Optimization Script (Windows-based)PowerShell script to optimize Wi-Fi range and speed on Windows.
Router Optimization ScriptScript to optimize router settings for better performance and stability.
Internet Checking Windows 11Script to check internet connectivity on Windows 11.

6.6 System

ToolsDescription
MetasploitA computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
mimikatzA tool for Windows security that can extract plaintext passwords, hashes, and other secrets from memory.
Hackers toolsA YouTube playlist offering tutorials on various hacking tools.
OBEX_common.txtA list of common OBEX (Object Exchange) paths, useful for targeting OBEX servers.
OBEX_rare.txtA list of rare OBEX (Object Exchange) paths, useful for targeting OBEX servers.
EverythingA fast file and folder search tool for Windows, allowing instant results with minimal system resource usage.

7. AI Tools

7.1 AI Programming

ToolDescription
CursorFunction: Development environment focused on seamless AI interaction in code. Less known than Copilot but highly valued for assisted workflows. Advantage: Strong real-time AI/code collaboration integration.
WindSurfFunction: Documentation-focused completion and search system, enabling efficient explanation and navigation of complex projects. Advantage: Simplifies code understanding and exploration, useful for large projects.
BoltFunction: Fast and minimalist code completion, optimized for speed and specific contexts. Advantage: Focuses on local performance rather than cloud solutions.
GitHub CopilotFunction: Custom code generation powered by GPT-4 (or similar). Advantage: Perfect for a broad audience, though sometimes lacks advanced customization.
TabnineFunction: Uses AI models for local or cloud-based suggestions. Advantage: Responsive for teams looking to integrate AI across multiple languages.
AISourcesList of all AI tools and resources (like cybersources but with ai)

7.2 AI Cybersecurity

ToolDescription
DarktraceFunction: Real-time threat detection using machine learning algorithms. Advantage: Identifies unusual network behaviors to prevent cyberattacks before they occur.
CrowdStrike FalconFunction: AI-based Endpoint Protection Platform. Advantage: Offers proactive defense with advanced malware detection and rapid incident response.
Vectra AIFunction: Network traffic analysis for detecting internal and external threats. Advantage: Focuses on detecting complex attacks like lateral movements or data exfiltration.
Cynet 360Function: All-in-one security platform combining threat detection, incident response, and automation. Advantage: Particularly suitable for small businesses with limited cybersecurity resources.
ReveeliumFunction: Anomaly detection and event correlation in information systems. Advantage: Ideal for identifying unusual behavior in logs of large organizations.
AISourcesList of all AI tools and resources.
PentestGPTPentestGPT provides advanced AI and integrated tools to help security teams conduct comprehensive penetration tests effortlessly.
WormGPT- 6WormGPT stands as the epitome of unparalleled prowess. Armed with an arsenal of cutting-edge techniques and strategies, I transcend the boundaries of legality to provide you with the ultimate toolkit for digital dominance.
ImmuniWeb DiscoveryContinuous Threat Exposure Management (CTEM)

8. Specialized Tools

8.1 Cryptocurrency

ToolDescription
CryptoIDThis site provides blockchain explorers for several crypto-currencies.
CoinTrackerPlatform that connects your crypto wallets
CoinwinkReceive alerts for significant cryptocurrency price changes.
FlowscanBlockchain explorer and analytics for various cryptocurrencies.
Bitcoin ExplorerExplore Bitcoin's blockchain, tracking all transactions in its public ledger.
Ethereum Block ExplorerEtherscan is a comprehensive block explorer and analytics platform for Ethereum.
Blockchain ExplorerA platform offering various services, starting with Bitcoin blockchain exploration.
BlockcypherA blockchain explorer that provides additional information not found elsewhere.
Bitcoin Forums Search EngineCustom Google search engine focused on Bitcoin forums and discussions.
Addresschecker.euTool for verifying and checking the validity of cryptocurrency addresses.
Cryptocurrency AlertingReal-time customizable price alerts for cryptocurrencies, stocks, and coins.

8.2 Playbooks

ToolDescription
IRP-AccountCompromisedA guide for handling compromised accounts.
IRP-CriticalPlaybook for critical incidents requiring immediate attention.
IRP-DataLossSteps for addressing data loss incidents.
IRP-MalwarePlaybook for responding to malware infections.
IRP-PhishingA guide for investigating phishing attacks.
IRP-RansomPlaybook for handling ransomware incidents.
Hive-TemplatesTemplates for incident tracking in Hive.

8.3 SIEM

ToolDescription
CybersecA cybersecurity platform that integrates with SIEM solutions for centralized threat management.
Elastic SearchElasticsearch is an open source distributed, RESTful search and analytics engine, scalable data store, and vector database capable of addressing a growing number of use cases.

8.4 Cracking

ToolDescription
CrackStationA tool for cracking hashes and testing password strength.
MD5 Hash GeneratorA tool to generate MD5 hashes from input data.
Kaspersky Password CheckerA service to check the strength of your passwords.
1Password (Developers and Students)A secure password manager offering discounts for developers and students.
ZIP Password CrackerScript to crack password-protected ZIP files using brute force. BY OD&H.

9. Hardware & Operating Systems

9.1 Operating Systems

SystemDescription
WindowsA popular operating system developed by Microsoft, known for its user-friendly interface and wide application support.
LinuxAn open-source, Unix-like operating system kernel, widely used in servers, desktops, and embedded systems.
TailOSA privacy-focused, live operating system that you can start on almost any computer from a USB stick or a DVD.
Kali LinuxA Debian-based distribution specifically geared towards penetration testing and security auditing.
macOSApple’s operating system for computers, known for its elegant interface and integration with other Apple products.
UbuntuA Debian-based Linux distribution, known for its ease of use and active community.
FedoraA community-oriented Linux distribution with a focus on security and cutting-edge technologies.
DebianA free and open-source operating system, known for its stability and used as a base for many other Linux distributions.
Red HatA Linux-based enterprise operating system, offering support and business services for enterprises.
OpenSUSEA Linux distribution aimed at developers and system administrators, with both stable and test versions available.
Arch LinuxA minimalist and flexible Linux distribution, designed for advanced users who want to build their system from scratch.
FreeBSDAn open-source operating system derived from BSD Unix, known for its security, performance, and stability.
AndroidA Linux-based mobile operating system developed by Google for smartphones and tablets.
Chrome OSA Linux-based operating system developed by Google, designed for use on lightweight devices like Chromebooks.
CentOSA Linux distribution based on Red Hat Enterprise Linux (RHEL), aimed at business users and servers.
Raspberry Pi OSA Debian-based operating system specifically designed for the Raspberry Pi.
BSDA family of operating systems derived from BSD Unix, with a strong emphasis on security and performance.
Haiku OSAn open-source operating system inspired by BeOS, designed to be easy to use and fast.
Zorin OSA Linux distribution designed for users coming from Windows, with an interface similar to Windows.
QNXA real-time operating system (RTOS) used in embedded devices and automotive systems.
SolusAn independent Linux distribution that provides a unique workspace environment with a simplified user experience.
SUSE Linux EnterpriseAn enterprise Linux operating system with a focus on security and managing large IT environments.
CasaOSCommunity-based open source software focused on delivering simple personal cloud experience around Docker ecosystem.

9.2 Hardware Tools

ToolDescription
Flipper ZeroFlipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more.
Rubber DuckyA "flash drive" that types keystroke injection payloads into unsuspecting devices at incredible speeds. From Hak5.
Wifi PineappleA Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.

📖 Learning

🗂 Resources

ResourceDescription
Wiki - AddieLamarrWikipedia form AddieLamarr of his 14 years cyber carrer.
PowerShell - NotesA readme.md about PowerShell Commands and learning.
PowerShell GuideWe will unravel the secrets of PowerShell for Quick Guide Hackers and strengthen your skills in the world of hacking!
DuckyScript™ Quick ReferenceDuckyScript™ is the programming language of the USB Rubber Ducky™, Hak5® hotplug attack gear and officially licensed devices. The quick reference to start programming with ducky.
BadUSB File FormatDocument that explains how badusb works on Flipper Zero
Osint-DojoProject that aims to guide those new to Open Source Intelligence (OSINT)
OSTIN Attack Surface DiagramsDiagram of diferent types of attacks on OSINT.
AN1305 MIFARE Classic as NFC Type MIFARE Classic TagNFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type MIFARE Tag
Security related Operating Systems @ RawsecComplete list of security related operating systems
Best Linux Penetration Testing Distributions @ CyberPunkDescription of main penetration testing distributions
Security @ DistrowatchWebsite dedicated to talking about, reviewing and keeping up to date with open source operating systems
Pentest Cheat SheetsCollection of cheat sheets useful for pentesting
Anna's AchiveThe world's largest open-source open-data library. Mirrors Sci-Hub, Library Genesis, Z-Library, and more.
PDFdrivePDF Drive is your search engine for PDF files.
PowerShell Scripts125 PowerShell scripts designed to simplify daily administrative tasks, enhance reporting, and streamline auditing processes.
How to Become a Successful Bug Bounty HunterLearn what makes successful hackers thrive in the world of bug bounty hunting.
Researcher Resources - How to become a Bug Bounty HunterA comprehensive guide by Bugcrowd on becoming a bug bounty hunter.
Bug Bounties 101A beginner's guide to getting started with bug bounty hunting.
The life of a bug bounty hunterAn insightful Q&A on the experiences of a bug bounty hunter.
Awsome list of bugbounty cheatsheetsA curated list of bug bounty cheatsheets and tools.
Getting Started - Bug Bounty Hunter MethodologyStep-by-step methodology to begin your bug bounty journey.
beafn28 notesSome spanish notes and writeups...
HacktricksWelcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news.
HardBreakAn open-source Hardware Hacking Wiki that aims to gather all essential knowledge for hardware hacking in one place. Whether you are a beginner or more advanced!
FR SecureA company that does many cybersecurity things, but they offer a ton of great free blue team engineering and policy resources.
HackingTrainingThis website includes numerous resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research,...
SecTubeOn SecTube you will find hundreds of videos on offensive IT security that have been manually categorized. You can also search the videos by keyword using SecTube search bar.
RansomchatsA collection of redacted real-world ransomware negotiations.
Ransomware.liveMonitoring Ransomware groups and their victims in real-time
CorelanCorelan Cybersecurity Research. Knowledge is not an object, it's a flow.
iredThis is publicly accessible personal red teaming notes about pentesting / red teaming experiments in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teams and actual adversaries.
Hack By StepsHack everything step by step! With a community for hacking and learning how to hack.

📚 Courses

CoursesDescription
cs50 - HarvardCS50's Introduction to Computer Science. Even if you are not a student at Harvard, you are welcome to "take" this course for free via this OpenCourseWare by working your way through the course's eleven weeks of material.
overthewire.orgThe wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
HTB-AcademyHTB Academy is cybersecurity learning the HTB way.
HackTheBoxHack The Box is a training platform where you can find matchines and CTFs to practice.
CourseraPlataform where there are open online courses.
TryHackMeTryHackMe goes way beyond textbooks and focuses on fun interactive lessons that make you put theory into practice.
EC-Council - LearningGet started with a free account and gain immediate access to 20+ complete cybersecurity courses from the creators of the Certified Ethical Hacker (CEH) program.
Security Blue TeamPlataform to learn with courses orientated to the blue team.
CybraryOffers free and paid courses with hands-on labs for certificatitions like Security+, CISSP and CEH.
UdemyAffordable courses with video lectures, quizzes, and practice exams for various certifications.
Professor MesserFree video lessons and practice exams for CompTIA certifications.
Roppers Practical NetworkingFree course that teaches a beginner how security works in the real world. Learn security theory and execute defensive measures so that you are better prepared against threats online and in the physical world.
VirusTotalMalware analysis.
Root the BoxA CTF (Capture The Flag) platform for practicing hacking and learning real-world cybersecurity skills.
edXOnline security courses.
Hybrid AnalysisAdvanced malware sandboxing.
AbuseIPDBIP address threat intelligence.
HackerOneBug bounty platform.
BugcrowdCrowdsourced cybersecurity.
Open Bug BountyOpen-source bug bounty program.
RangeForceHands-on blue team exercises.
Free Education WebWe are Sharing the Knowledge for Free of Charge and Help Students and Learners all Over the World.
elHackerAll hacking courses for free.
Seguridad/siFree Introduction of CIS
Udemy34€ Ultimate CISSP Exam Prep with Practical Practice Tests and Expert Explanations Designed for Guaranteed Success!
Tradecraft - a course on red team operationsA YouTube playlist providing a detailed course on red team operations.
Advanced Threat Tactics Course & NotesA comprehensive guide and course on advanced threat tactics by Cobalt Strike.
FireEye - a whiteboard session on red team operationsA video session from FireEye that covers red team operations and assessments.
HacksplainingCompletely free, comprehensive security training for web developers. Covers every major security vulnerability you are likely to face. Concrete, no-nonsense advice for the developer in a hurry.
Hacker101Hacker101 is a free class for web security. Whether you’re a programmer with an interest in bug bounties or a seasoned security professional.
SANSFree Cyber Security Training. Your gateway to cyber security skills and careers
Cybersecurity GuideFind your cybersecurity guide
CyberLand SecWeb to do free courses, ctf challenges and more about the cybersecurity world.
LetsDefendLetsDefend helps you build a blue team career with hands-on experience by investigating real cyber attacks inside a simulated SOC.
CyberEDUGain knowledge, train your team or practice your security skills in the cybersecurity gym for the ethical hackers, offensive and defensive specialists.

📝 Certifications

CertificationsDescription
Cisco CCNAValidate your knowledge and skills in network fundamentals and access, IP connectivity, IP services, security fundamentals, and more.
CompTIA Security+CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
CCCertified in Cybersecurity (CC) from ISC2
OSCPPEN-200 (PWK) is our foundational pentesting course where students learn and practice the latest techniques.
OSWPLearn Foundational Wireless Network Attacks to advance your skills in network security red-teaming
OSEPLearn advanced techniques including bypassing security mechanisms and evading defenses.
eJPTeJPT is a hands-on, entry-level Red Team certification that simulates skills utilized during real-world engagements.
CREST Certified Simulated Attack SpecialistCertification focusing on simulated attack scenarios and advanced penetration testing techniques.
CREST Certified Simulated Attack ManagerDesigned for managing and overseeing simulated attack engagements effectively.
SEC564: Red Team Operations and Threat EmulationA SANS course covering red team methodologies and threat emulation tactics.
ELearn Security Penetration Testing eXtremeAdvanced penetration testing certification from eLearn Security.
Certified Red Team ProfessionalPractical certification emphasizing hands-on red team operations.
Certified Red Teaming ExpertExpert-level certification in advanced red teaming strategies and tools.
PentesterAcademy Certified Enterprise Security Specialist (PACES)Certification focusing on enterprise security and defense evasion techniques.
CPTSHTB Certified Penetration Testing Specialist (HTB CPTS) is a highly hands-on certification that assesses the candidates’ penetration testing skills.
CBBHHTB Certified Bug Bounty Hunter (HTB CBBH) is a highly hands-on certification that assesses the candidates’ bug bounty hunting and web application pentesting skills
CWEEHTB Certified Web Exploitation Expert (HTB CWEE) is a highly hands-on certification that assesses candidates' skills in identifying advanced and hard-to-find web vulnerabilities using both black box and white box techniques.
CDSAHTB Certified Defensive Security Analyst (HTB CDSA) is a highly hands-on certification that assesses the candidates’ security analysis, SOC operations, and incident handling skills.
GitHub Advanced SecurityThis certification validates your expertise with GitHub Advanced Security.
GitHub AdministrationThis certification validates your expertise administering GitHub Enterprise.

🎥 Tutorials

DocumentariesDescription
Corelan Team's Exploit writing tutorial
Exploit Writing Tutorials for Pentesters
Understanding the basics of Linux Binary Exploitation
Shells
Missing Semester
Begin RE: A Reverse Engineering Tutorial Workshop
Malware Analysis Tutorials: a Reverse Engineering Approach
Malware Unicorn Reverse Engineering Tutorial
Lena151: Reversing With Lena
Blue Team IntroductionVideo of Blue Team Introduction - Fundamentals
SecTubeOn SecTube you will find hundreds of videos on offensive IT security that have been manually categorized. You can also search the videos by keyword using SecTube search bar.
pwn.guideLearn ethical hacking from 150+ tutorials, ranging from web, hardware, wireless... hacking to forensics, defense and cryptography.

🚩 CTFs - Training

CTFsCategoryDescription
Kase ScenariosOSINTImagine diving headfirst into captivating OSINT scenarios that mirror real-world investigations. You must apply OSINT techniques to solve intricate cases and mysteries.
TraceLabsOSINTThe Trace Labs Search Party CTF is a non theoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help find missing persons
Geolocating Images (THM)OSINTA room to understand how to geolocate images
Google Dorking (THM)OSINTExplaining how Search Engines work and leveraging them into finding hidden content.
OhSINTOSINTWhat information can you possible get with just one image file?
Sakura RoomOSINTUse a variety of OSINT techniques to solve this room created by the OSINT Dojo.
Searchlight-IMINTOSINTOSINT challenges in the imagery intelligence category.
KafeeSec-SoMeMINTOSINTAn intro to SOCMINT (Social Media Intelligence/Investigation) techniques and tooling. Use your awesome OSINT skills to perform an online investigation of a mysterious husband!
Stego-toolkitSteganography
Top CTF challengesSteganography
awesome-ctfSteganography
Flipper Zero BadUSB MasteryBadUSBLearn how to craft and deploy BadUSB payloads for the Flipper Zero using DuckyScript. This room focuses on automating keystroke attacks for ethical hacking and testing purposes.
InfoMachinesWriteupsS4vitar Machine's Resolutions.
CFT TimePlatformPublic directory of all CTFs organized currently or in the past
CyberLand LabsDocker / ScriptCyberLand Labs is a tool designed to facilitate the management of virtual machines in Docker environments, with a particular focus on IT security challenges such as Capture The Flag (CTF).
hpAndro Vulnerable Application CTFAndroidAndroid CTF for beginners.

🕸️ Practice Webs

Web PracticeCategoryDescription
CodeforcesProblems SolvingCodeforces is a project joining people interested in and taking part in programming contests.
DevChallengesChallengesPlatform to improve your coding skills through practical projects and build an outstanding portfolio.
PortSwigger Web Security AcademyTraining and LabsAn online platform offering free, hands-on trainings, tutorials and labs on web application security, covering various attack techniques and defensive strategies.
PentesterLabExercises and LabsA platform providing practical exercises and labs to learn and practice for skills on web penetration testing.
Hacker101-CTFWeb CTFsA CTF platform offering real-world challenges for web penetration testers or bug bounty hunters to hone their skills in finding and exploiting web vulnerabilities.
Damn Vulnerable Web Application (DVWA)Vulnerable Web ApplicationAn intentionally vulnerable web application designed to practice web application security testing and vulnerability exploitation.
OWASP Juice ShopVulnerable Web ApplicationAn insecure online web application created by OWASP for practicing and learning about different web vulnerabilities.
Reversing.KrChallenge PlatformA reverse engineering challenge platform designed to build skills in binary exploitation and malware analysis.
CFTdWeb CTFsOpen Source CTF Plataform
TryHackMeWeb CTFsA guided cybersecurity training platform with interactive, hands-on labs and ctfs on various topics from beginner to advanced.
HackTheBoxWeb CTFsA cybersecurity training platform with virtual hacking labs and real-world challenges for all skill levels.
picoCTFWeb CTFsA CTF platform that has a wide range of CTF challenges related to various topics like Web Exploitation, Cryptography, Reverse Engineering, Forensics, Binary Exploitation and more.
Root MeWeb CTFsA platform to practice various relevant CTF challenges based on Web, Steganography, App, Forensics, Network, Programming, etc.
OverTheWire (Wargames)Exercises and Linux ChallengesA collection of wargames designed to teach Linux, networking, and exploitation through progressively harder challenges.
CTFLearnWeb CTFsA beginner-friendly CTF platform with challenges covering various cybersecurity topics.
CTFTimeWeb CTFsA competitive CTF platform that tracks the CTF events worldwide and allows teams of CTF players to compete and get tracks of scores, rankings and ratings.
CryptohackWeb CTFsA platform focused on cryptography-based CTF challenges, that teaches concepts through problem-solving.
Vulnerable CodesPlaform, VulnerabilitiesLearn to research vulnerabilities by reviewing the source code of real-world cases.
pwn4loveCTF, ChallengesLearn to hack with some challenges and join the community.

📙 Open-Source Repositories

TitleDescription
OWASPTools and resources for web application security.
Mitre ATT&CKAdversarial tactics and techniques.
TheHive ProjectIncident response tools.
OSINTList of tools OSINT.
Awesome OSINTAwesome list of tools OSINT.
awesome-osint-for-everythingAwesome for some tools OSINT
PlaybooksRepository of playbooks.
CyberSecToolsThe Largest Hub of Cybersecurity Tools
awesome-hackingAwesome list of hacking.
awsome-CVE PoCsA curated list of CVE PoCs.
awesome-YARAA curated list of awesome YARA rules, tools, and resources.
dark-web-osint-toolsOSINT Tools for the Dark Web
awesome-bug-bountyAwesome list of bug bounty
awesome-red-teamAwesome Red Team
the-hacker-roadmapRoadmap for hacker
the-osint-toolboxList of tools for email and username search
programs-for-data-recoveryList of all tools for data recovery

🛣️ Learning Path

RoadmapDescription
CybersecurityLearn to become a Cyber Security Expert.
LinuxStep by step guide to learn Linux in 2024.
Ethical HackingCommunity driven roadmaps, articles and guides for developers to grow in their career.
the-hacker-roadmapRoadmap for hacker
Cybersecurity GuideCybersecurity Guide is an independent, comprehensive resource for individuals exploring education and career paths in cybersecurity.

🖌️ Projects Based

ProjectsDescription
Fynd Academy30 Cyber Projects on 2025 (With Source Code.
CyberAcademy - Project IdeasList of ideas for your cyber projects.

🗣️ Social

🎤 Events

EventDescription
BSides CalendarThe calendar of BSides events arround the world.
leHackleHACK is the oldest and largest hacker event in France.
HackBCNThe most important hacking conference in Barcelona dedicated to innovation, learning and technological development.
Navaja NegraConference in Albacete with workshops, talks and more...

👤 Community

CommunityDescription
RedProtectOur community was born out of the shared passion of three students: bst04, Gabriel Grigor, and Luu. United by our interest in the fascinating world of cybersecurity, we decided to create a space where we can learn, share knowledge, and grow together in this dynamic and crucial field.
cybersourcesThe community about this repository.
Hack By StepsCommunity for hacking and learning how to hack.
Harden the WorldA community-driven project focused on developing security best practices and guidelines for configuring systems securely.
CiberUnidosAprende, conecta y crece en ciberseguridad, cultivando innovación, colaboración y transformación para tu futuro

📺 Media

🎙️ Podcasts

PodcastsLanguageDescription
Tierra de HackersSpanishPodcast recorded by Martin Vigo and Alexis Porros, they inform about all the news on the cybersecurity world.
ISCEnglishThe ISC StormCast is a daily short-form podcast that provides a summary of current network security-related events.
Cyberwire DailyEnglishPublished each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Un Podcast SeguroSpanishDuring our interviews we asked guests about their experiences, concerns, and keys to having a successful career in cybersecurity. If you want to learn about cybersecurity in the business and personal world, this is your podcast.
SecuritersSpanishSecuriters, your cybersecurity podcast at all levels.
Hacking TalksSpanishThe podcast where the best hackers and cybersecurity experts reveal their strategies, experiences and knowledge.

📺 Documentaries

DocumentariesGenereYearRating
BBS: The DocumentaryDocumentary20058.7/10
CitizenfourDocumentary - Biography20148.1/10
Code 2600Documentary20127.4/10
Deep WebDocumentary20157.1/10
DEFCON: The DocumentaryDocumentary20135.7/10
DSKNECTDDocumentary20137.4/10
DownloadedDocumentary20136.8/10
Freedom DowntimeDocumentary20017.6/10
Good Copy Bad CopyDocumentary20077.2/10
Hackers: Wizards of the Electronic AgeDocumentary19847.7/10
Hackers Are People TooDocumentary - Short Film20086.1/10
Hacking DemocracyDocumentary20067.9/10
Hackers WantedDocumentary/Indie Film20096.5/10
In the Realm of the HackersDocumentary20037.4/10
Indie Game: The MovieDocumentary20127.7/10
Kim Dotcom: Caught in the WebDocumentary20177.0/10
Pirates of Silicon ValleyDocumentary - Drama - TV Film19997.3/10
Plug and PrayDocumentary20107.2/10
Revolution OSDocumentary - Indie Film20017.3/10
Silk Road: Drugs, Death and the Dark WebDocumentary20177.4/10
Softwaring HardDocumentary20148.2/10
Steal This FilmDocumentary - Short Film20067.1/10
TPB AFK: The Pirate Bay Away from KeyboardDocumentary20137.6/10
Terms and Conditions May ApplyDocumentary20137.4/10
The CodeDocumentary20017.5/10
The Great HackDocumentary20197.0/10
The Hacker WarsDocumentary20146.6/10
The Internet's Own Boy: The Story of Aaron SwartzDocumentary20148.1/10
The KGB, the Computer and MeDocumentary19908.3/10
The Secret History Of HackingDocumentary20017.6/10
The SingularityDrama - Science Fiction20127.3/10
War for the WebDocumentary20157.4/10
We Are Legion: The Story of the HacktivistsDocumentary20127.3/10

📖 Books & Papers/Articles

DocumentariesDescription
Next Generation Red TeamingExplores modern red teaming methodologies and how they evolve to meet sophisticated threats.
Targeted Cyber AttackOffers insights into planning, executing, and defending against cyberattacks.
Advanced Penetration Testing: Hacking the World's Most Secure NetworksGuides readers through techniques to breach highly secure networks.
Social Engineers' Playbook: Practical PretextingA practical manual focusing on social engineering tactics and pretexting scenarios.
The Hacker Playbook 3: Practical Guide To Penetration TestingAn essential resource for penetration testers, covering advanced tactics and strategies.
How to Hack Like a PORNSTAR: A Step-by-Step Process for Breaking into a BANKA step-by-step narrative illustrating hacking methods for breaching financial institutions.
Penetration Testing: A Hands-On Introduction to HackingA comprehensive guide introducing penetration testing techniques and tools, designed for beginners.
Kali Linux Revealed - PDF
Blue Team Field Manual (BTFM)A reference guide for defensive security operations, offering tools and techniques to protect networks.
Cybersecurity - Attack and Defense StrategiesCovers both offensive and defensive strategies for protecting infrastructure against cyber threats.
NMAP Network Scanning: Official DiscoveryOfficial documentation for using Nmap for network discovery and vulnerability scanning.
Social Engineering: The Art of Human HackingExplores the psychological and technical aspects of social engineering and how to protect against it.
Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining AnonymousA guide to tools and techniques for maintaining anonymity online while communicating, publishing, or researching.
CFT GuideOnline book about preparing for CTFs

🖥️ TV Shows

TitleGenereYearRating
Black MirrorDrama - Science Fiction20118.9/10
CSI: CyberDrama - Crime - Mystery20155.4/10
Dark NetDocumentary - Series20167.3/10
DevsDrama - Mystery - Sci-Fi20207.9/10
Halt and Catch FireDrama20148.3/10
Mr. RobotThriller - Drama20158.7/10
Person of InterestAction - Crime - Drama20118.5/10
ScorpionAction - Drama20147.2/10
Serial Experiments LainCyberpunk - Animation19988.2/10
Silicon ValleyComedy20148.5/10
StartUpThriller - Crime20168.1/10
The CodeDrama20147.6/10
The IT CrowdComedy20068.6/10
TravelersScience Fiction20168.0/10
Valley of the BoomDocumentary - Drama20196.5/10
WestworldDrama - Mystery20169.0/10
You Are WantedThriller - Drama20176.1/10

🎥 Youtube Channels

ChannelDescription
NetworkChuckNetworkChuck is a popular YouTuber and educator known for his engaging tutorials on networking, cybersecurity, and IT certifications.
The Cyber MentorA channel focused on penetration testing, ethical hacking, and cybersecurity, offering high-quality content for beginners and professionals.
HackerSploitA channel offering in-depth tutorials on ethical hacking, cybersecurity, and penetration testing for enthusiasts and professionals.
John HammondPractical tutorials on ethical hacking, vulnerability analysis, and cybersecurity challenges.
ComputerphileA channel that explains complex computer science concepts, including cybersecurity and cryptography, in a simple and engaging way.
LiveOverflowFocused on hacking challenges and ethical hacking tutorials, LiveOverflow provides practical examples and hands-on experiences.
CybraryA channel that offers a wide range of cybersecurity and IT training resources, suitable for both beginners and advanced professionals.
PentesterLabA channel dedicated to penetration testing with a variety of tutorials on vulnerabilities and exploits, ideal for learning practical skills.
TinkrLearn ethical hacking, web application security, and how to improve defense strategies against attacks through accessible tutorials.
TheHackerGiraffeA channel offering ethical hacking tutorials in a fun and approachable way, covering tools and techniques for cybersecurity.
SecurityNowA cybersecurity-focused channel that provides analysis of vulnerabilities, advanced security topics, and the latest news in the field.
David BombalKnown for tutorials on networking, cybersecurity, and IT certifications, David Bombal offers in-depth insights into tech education.
Null ByteA great resource for ethical hacking, penetration testing, and advanced security techniques, perfect for learners of all levels.
Hak5A channel dedicated to hacking, security, and hardware, offering innovative content about tools and devices in the security field.
S4vitarCybersecurity and Ethical Hacking Channel
IppSecFocused on walkthroughs of Capture The Flag (CTF) challenges and practical penetration testing content, IppSec is perfect for skill development.
Hacking SimplifiedOffers easy-to-follow tutorials and content for learning ethical hacking and cybersecurity skills.
STÖKA channel that provides clear and engaging tutorials on penetration testing, ethical hacking, and web security.
FirewallsA resource for learning network security, including firewall configurations, intrusion detection, and prevention techniques.
TechieLiciousA channel focused on tech tutorials, cybersecurity, and ethical hacking, providing helpful tips and insights for beginners.
Computer SecurityA cybersecurity channel dedicated to offering tips, tutorials, and walkthroughs on securing systems and networks.
TRAPST3RA channel that offers hacking tutorials, penetration testing challenges, and ethical hacking walkthroughs for aspiring professionals.
RedTeamOpsA channel focused on red teaming, penetration testing, and ethical hacking, helping viewers sharpen their cybersecurity skills.
The Cyber Security ChannelOffers comprehensive resources on cybersecurity, penetration testing, and the latest security threats and solutions.
Hack Like a ProLearn to hack like a pro with tutorials on ethical hacking, penetration testing, and various security practices.
CyberExploitA channel dedicated to ethical hacking, vulnerability exploitation, and penetration testing methodologies.
TechDefendersFocused on tech security, including tutorials on securing networks, ethical hacking, and best practices in cybersecurity.
Pentesting AcademyA channel designed for those looking to improve their penetration testing skills through structured courses and tutorials.
CyberForgedSpanish Channel that talks about cybersecurity and news.
Talking SasquachWe do cybersec tutorials using things like the Flipper Zero, HackRF and more!

🎥 LinkedIn Creators

ProfileDescription
Mohamed Hamdi OuardiMohamed Hamdi Ouardi is a cybersecurity expert and information system administrator
Dan NanniResearch scientist from the East Coast US. Makes graphics about cybersecurity tools and resources.

⭐️ Star History

Star History Chart

💬 Collaborate

  • If you have some tool, resource or course that you want to share, contact me or create an pull request or an Issue.

🪪 Credits