Cybersecurity oriented awesome list
β3,585Apr 12, 2026Updated last week
Alternatives and similar repositories for awesome-list
Users that are interested in awesome-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust π¦β3,395Apr 13, 2026Updated last week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.β3,378Apr 13, 2026Updated last week
- Conference presentation slidesβ2,377Nov 15, 2025Updated 5 months ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structurβ¦β8,826Mar 25, 2026Updated 3 weeks ago
- Tools and Techniques for Red Team / Penetration Testingβ8,661Mar 18, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- OSWE, OSEP, OSED, OSEEβ3,798Jan 2, 2026Updated 3 months ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managemβ¦β1,464Oct 4, 2024Updated last year
- Windows Local Privilege Escalation Cookbookβ1,303Feb 5, 2026Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,186Mar 28, 2025Updated last year
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitterβ3,468Feb 10, 2024Updated 2 years ago
- A curated list of GPT agents for cybersecurityβ6,485Jul 21, 2024Updated last year
- This repo is about Active Directory Advanced Threat Huntingβ650Feb 17, 2025Updated last year
- A resource containing all the tools each ransomware gangs usesβ1,344Apr 1, 2026Updated 2 weeks ago
- Awesome EDR Bypass Resources For Ethical Hackingβ1,517Jan 26, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- β1,718Aug 19, 2022Updated 3 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,453Apr 8, 2026Updated last week
- Hardcore Debuggingβ936Apr 9, 2026Updated last week
- Awesome Security lists for SOC/CERT/CTIβ1,421Updated this week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Mβ¦β3,737Updated this week
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.β485Apr 17, 2025Updated last year
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serveβ¦β619Jul 21, 2025Updated 8 months ago
- Centralized resource for listing and organizing known injection techniques and POCsβ693Feb 1, 2026Updated 2 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviroβ¦β1,288Jan 29, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hack-A-Sat Qualifiers Writeupsβ259Dec 22, 2022Updated 3 years ago
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β5,248Jul 15, 2024Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,905Oct 29, 2025Updated 5 months ago
- β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈβ4,560Jan 5, 2026Updated 3 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,477Updated this week
- A collection of links related to Linux kernel security and exploitationβ6,408Mar 7, 2026Updated last month
- πA Curated List Of Modern Android Exploitation Conference Talks.β716Updated this week
- A curated list of awesome embedded and IoT security resources.β2,295Oct 17, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,576Jan 18, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A collection of resources to learn Reverse Engineering from start!β1,399Mar 18, 2025Updated last year
- A Curated list of Security Resources for all connected thingsβ3,232Mar 7, 2026Updated last month
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-β¦β4,412Apr 10, 2026Updated last week
- game of active directoryβ7,691Mar 12, 2026Updated last month
- β903Mar 17, 2026Updated last month
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!β1,858Apr 8, 2026Updated last week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom β¦β1,067Mar 10, 2026Updated last month