GitHub Project Resource List
☆375Sep 2, 2016Updated 9 years ago
Alternatives and similar repositories for Resource-List
Users that are interested in Resource-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆305Apr 9, 2016Updated 10 years ago
- A collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.☆613Jan 11, 2025Updated last year
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,383Mar 18, 2022Updated 4 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆241Mar 29, 2026Updated last month
- RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by H…☆1,695May 28, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Great security list for fun and profit☆1,867Dec 14, 2022Updated 3 years ago
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- OSX and iOS related security tools☆1,650Mar 25, 2026Updated last month
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,737Sep 13, 2023Updated 2 years ago
- WiFi arsenal☆2,183Jul 6, 2020Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,109May 27, 2022Updated 3 years ago
- Collection of the cheat sheets useful for pentesting☆4,310Feb 16, 2024Updated 2 years ago
- A collection of sources of indicators of compromise.☆971May 8, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A list of Reverse Engineering articles, books, and papers☆2,671May 2, 2023Updated 2 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,320Dec 7, 2020Updated 5 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,938Oct 20, 2025Updated 6 months ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,856Jun 28, 2022Updated 3 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,934May 15, 2023Updated 2 years ago
- A Collection of Hacks in IoT Space so that we can address them (hopefully).☆2,406May 16, 2020Updated 5 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,378Sep 3, 2025Updated 7 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,948Oct 10, 2025Updated 6 months ago
- a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE☆532Apr 11, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated list of awesome social engineering resources.☆3,955Apr 5, 2023Updated 3 years ago
- A list of web application security☆6,831Updated this week
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,806Apr 3, 2024Updated 2 years ago
- My musings with PowerShell☆2,715Nov 19, 2021Updated 4 years ago
- ☆485Jan 29, 2025Updated last year
- ⭐️ A curated list of awesome forensic analysis tools and resources☆5,027Apr 12, 2026Updated 2 weeks ago
- ☆143Apr 21, 2017Updated 9 years ago
- A curated list of awesome infosec courses and training resources.☆5,639Nov 21, 2025Updated 5 months ago
- ✍️ A curated list of CVE PoCs.☆3,499Jan 4, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🚗 A curated list of resources for learning about vehicle security and car hacking.☆4,275Mar 20, 2026Updated last month
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- A collected list of awesome security talks☆4,207Feb 17, 2026Updated 2 months ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,179Jul 31, 2024Updated last year
- A curated list of awesome reversing resources☆4,484Aug 19, 2023Updated 2 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago