GitHub Project Resource List
☆376Sep 2, 2016Updated 9 years ago
Alternatives and similar repositories for Resource-List
Users that are interested in Resource-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆305Apr 9, 2016Updated 10 years ago
- A collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.☆614Jan 11, 2025Updated last year
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,384Mar 18, 2022Updated 4 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆242Mar 29, 2026Updated last month
- RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by H…☆1,698May 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- OSX and iOS related security tools☆1,657Mar 25, 2026Updated last month
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,744Sep 13, 2023Updated 2 years ago
- WiFi arsenal☆2,190Jul 6, 2020Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,112May 27, 2022Updated 3 years ago
- Collection of the cheat sheets useful for pentesting☆4,317Feb 16, 2024Updated 2 years ago
- A collection of sources of indicators of compromise.☆981May 8, 2025Updated last year
- A list of Reverse Engineering articles, books, and papers☆2,671May 2, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,327Dec 7, 2020Updated 5 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,945Oct 20, 2025Updated 7 months ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,864Jun 28, 2022Updated 3 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,946May 15, 2023Updated 3 years ago
- A Collection of Hacks in IoT Space so that we can address them (hopefully).☆2,410May 16, 2020Updated 6 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,382Sep 3, 2025Updated 8 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,958Oct 10, 2025Updated 7 months ago
- a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE☆536Apr 11, 2026Updated last month
- A curated list of awesome social engineering resources.☆3,985Apr 5, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of web application security☆6,826Apr 28, 2026Updated 3 weeks ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,813Apr 3, 2024Updated 2 years ago
- My musings with PowerShell☆2,716Nov 19, 2021Updated 4 years ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆5,049Apr 12, 2026Updated last month
- ☆489Jan 29, 2025Updated last year
- ☆143Apr 21, 2017Updated 9 years ago
- A curated list of awesome infosec courses and training resources.☆5,661Nov 21, 2025Updated 5 months ago
- ✍️ A curated list of CVE PoCs.☆3,502Jan 4, 2022Updated 4 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking.☆4,297Mar 20, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- A collected list of awesome security talks☆4,211Feb 17, 2026Updated 3 months ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,191Jul 31, 2024Updated last year
- A curated list of awesome reversing resources☆4,491Aug 19, 2023Updated 2 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,654Jan 1, 2024Updated 2 years ago