A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆29Jan 22, 2016Updated 10 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below
Sorting:
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆20Mar 1, 2026Updated 3 weeks ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 10 months ago
- A repository full of malware samples.☆13Nov 29, 2020Updated 5 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- ☆17Jun 21, 2024Updated last year
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- Your favourite chest/terminal bursting buddy!☆18Nov 27, 2021Updated 4 years ago
- Go con Ejemplos☆17Apr 6, 2021Updated 4 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆57Dec 6, 2016Updated 9 years ago
- Seamless AI Integration into Caido☆45Updated this week
- Bug Bounty Recon wordlist Generator☆21Jul 17, 2020Updated 5 years ago
- ☆26Mar 3, 2022Updated 4 years ago
- Jenkins Plugin from Contrast Security☆13Aug 9, 2024Updated last year
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Zip brute is a python script that cracks zip that are password protected using a wordlist dictionary.☆23Jun 14, 2021Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- ☆34May 1, 2022Updated 3 years ago
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 5 years ago
- ☆12Jan 7, 2020Updated 6 years ago
- Listen to the weather using Sonic Pi and data from Mathematica☆11Dec 6, 2018Updated 7 years ago
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- A Golang module to resolve multiple DNS requests concurrently while respecting a rate limit on the resolvers.☆12May 26, 2021Updated 4 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,499Mar 7, 2026Updated 2 weeks ago
- ☆15Sep 11, 2020Updated 5 years ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- a repository of figlet fonts☆21Jul 21, 2013Updated 12 years ago
- A userscript to improve various features of FetLife.com, especially data portability and interoperability functionality.☆10Jun 19, 2014Updated 11 years ago