Cybersecurity oriented awesome list
β3,647May 2, 2026Updated last week
Alternatives and similar repositories for awesome-list
Users that are interested in awesome-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust π¦β3,482May 5, 2026Updated last week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.β3,413May 1, 2026Updated last week
- Conference presentation slidesβ2,378Nov 15, 2025Updated 5 months ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structurβ¦β8,862May 2, 2026Updated last week
- Tools and Techniques for Red Team / Penetration Testingβ8,719Apr 18, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OSWE, OSEP, OSED, OSEEβ3,817Jan 2, 2026Updated 4 months ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managemβ¦β1,469Oct 4, 2024Updated last year
- Windows Local Privilege Escalation Cookbookβ1,318Feb 5, 2026Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,255Mar 28, 2025Updated last year
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitterβ3,469Feb 10, 2024Updated 2 years ago
- A curated list of GPT agents for cybersecurityβ6,506Jul 21, 2024Updated last year
- This repo is about Active Directory Advanced Threat Huntingβ648Feb 17, 2025Updated last year
- A resource containing all the tools each ransomware gangs usesβ1,356Apr 1, 2026Updated last month
- Awesome EDR Bypass Resources For Ethical Hackingβ1,522Jan 26, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- β1,719Aug 19, 2022Updated 3 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Mβ¦β3,820Apr 16, 2026Updated 3 weeks ago
- Hardcore Debuggingβ938Apr 9, 2026Updated last month
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,605Updated this week
- Awesome Security lists for SOC/CERT/CTIβ1,441Updated this week
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.β486Apr 17, 2025Updated last year
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serveβ¦β625Jul 21, 2025Updated 9 months ago
- Centralized resource for listing and organizing known injection techniques and POCsβ696Feb 1, 2026Updated 3 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviroβ¦β1,291Jan 29, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hack-A-Sat Qualifiers Writeupsβ259Dec 22, 2022Updated 3 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,913Oct 29, 2025Updated 6 months ago
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β5,277Jul 15, 2024Updated last year
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,551Updated this week
- β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈβ4,588Jan 5, 2026Updated 4 months ago
- A collection of links related to Linux kernel security and exploitationβ6,435Mar 7, 2026Updated 2 months ago
- πA Curated List Of Modern Android Exploitation Conference Talks.β720Apr 25, 2026Updated 2 weeks ago
- A curated list of awesome embedded and IoT security resources.β2,312Oct 17, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,603Jan 18, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A collection of resources to learn Reverse Engineering from start!β1,415Mar 18, 2025Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-β¦β4,452Apr 22, 2026Updated 2 weeks ago
- A Curated list of Security Resources for all connected thingsβ3,305Apr 25, 2026Updated 2 weeks ago
- game of active directoryβ7,771Mar 12, 2026Updated 2 months ago
- β905Mar 17, 2026Updated last month
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!β1,866Apr 27, 2026Updated 2 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom β¦β1,077May 3, 2026Updated last week