Cybersecurity oriented awesome list
β3,398Mar 24, 2026Updated this week
Alternatives and similar repositories for awesome-list
Users that are interested in awesome-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust π¦β3,349Mar 4, 2026Updated 3 weeks ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.β3,318Mar 22, 2026Updated last week
- Conference presentation slidesβ2,378Nov 15, 2025Updated 4 months ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structurβ¦β8,799Updated this week
- Tools and Techniques for Red Team / Penetration Testingβ8,608Mar 18, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- OSWE, OSEP, OSED, OSEEβ3,795Jan 2, 2026Updated 2 months ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managemβ¦β1,452Oct 4, 2024Updated last year
- Windows Local Privilege Escalation Cookbookβ1,287Feb 5, 2026Updated last month
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitterβ3,378Feb 10, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,179Mar 28, 2025Updated last year
- A curated list of GPT agents for cybersecurityβ6,482Jul 21, 2024Updated last year
- This repo is about Active Directory Advanced Threat Huntingβ650Feb 17, 2025Updated last year
- A resource containing all the tools each ransomware gangs usesβ1,332Mar 18, 2026Updated last week
- Awesome EDR Bypass Resources For Ethical Hackingβ1,500Jan 26, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- β1,709Aug 19, 2022Updated 3 years ago
- Awesome Security lists for SOC/CERT/CTIβ1,297Updated this week
- Hardcore Debuggingβ938Jan 6, 2026Updated 2 months ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.β485Apr 17, 2025Updated 11 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,352Mar 21, 2026Updated last week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Mβ¦β3,715Mar 21, 2026Updated last week
- Centralized resource for listing and organizing known injection techniques and POCsβ689Feb 1, 2026Updated last month
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviroβ¦β1,286Jan 29, 2026Updated 2 months ago
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serveβ¦β618Jul 21, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hack-A-Sat Qualifiers Writeupsβ259Dec 22, 2022Updated 3 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,901Oct 29, 2025Updated 5 months ago
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β5,214Jul 15, 2024Updated last year
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,392Updated this week
- πA Curated List Of Modern Android Exploitation Conference Talks.β715Mar 20, 2026Updated last week
- A curated list of awesome embedded and IoT security resources.β2,259Oct 17, 2023Updated 2 years ago
- A collection of links related to Linux kernel security and exploitationβ6,391Mar 7, 2026Updated 3 weeks ago
- β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈβ4,541Jan 5, 2026Updated 2 months ago
- A collection of resources to learn Reverse Engineering from start!β1,393Mar 18, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Curated list of Security Resources for all connected thingsβ3,216Mar 7, 2026Updated 3 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,549Jan 18, 2026Updated 2 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-β¦β4,395Mar 18, 2026Updated last week
- game of active directoryβ7,610Mar 12, 2026Updated 2 weeks ago
- This is a repository of resource about Malware techniquesβ825Apr 8, 2023Updated 2 years ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom β¦β1,059Mar 10, 2026Updated 2 weeks ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!β1,857Updated this week