A huge collection of useful things, tools, books and other resources for hackers, penetration testers and security researchers.
A collection of sources about Android security.
Resources for learning about application security.
List of programs and recordings by Bug Bounty.
Penetration Testing / Security Cheat Sheets.
List of frameworks by CTF, libraries, various sources, software.
List of hacking environments where you can hone your skills legally and safely.
A list of great community-supported DevSecOps tools.
Resources for learning about Exploit Development.
A list of resources for learning fuzzing and early stages of Exploit Development like root cause analysis.
A list of awesome hacking tutorials, tools and other resources.
List of honeypot resources.
List of incident response tools.
Industrial Control System Security
List of resources related to automated control system (ICS) security.
A list of amazing information security courses and learning resources.
Collection of IoT hacks.
List of amazing malware analysis tools and resources.
A list of great Open Source Intelligence (OSINT) tools and resources.
OSX and iOS Security
Security tools for OSX and iOS.
Collection of tools developed by computer science researchers for network processing.
A list of amazing penetration testing resources, various tools and standouts.
Libraries for generating pseudo-random numbers, data encryption and vulnerability scanning.
A list of awesome reverse engineering resources.
List of useful security conversations.
A collection of several types of lists used during a security assessment.
A collection of software, libraries, documents, books, resources, and other interesting security content.
List of amazing social engineering resources.
List of static analysis tools, linters and code quality checkers for various programming languages.
List of Threat Intelligence resources.
A list of resources for learning about car security and hacking.
List of vulnerability research resources.
List on the subject of web application security.
A list of amazing resources for using Windows.
A set of various tools for cracking 802.11.
Other useful repositories
API Security Checklist
A checklist of the most important security countermeasures when developing, testing, and releasing your API.
Various public documents, white papers, and articles on targeted cyberattacks (APTs).
Bug Bounty Reference
A list of bug bounty sorted into categories based on bug characteristics.
Tools and sources of materials on cryptography.
Frameworks, libraries, other sources and software for Capture the Flag.
Список CVE Proof of Concepts (PoCs).
Excellent tools and sources for expert analysis.
Free Programming Books
Free books for developers.
Gray Hacker Resources
Goodies for Capture the Flag, War Games and Pentesting.
Infosec Getting Started
A collection of sources, documentation, links and more to help people learn information security.
An excellent guide to information security.
Collection of sources with indicators of compromise.
Linux Kernel Exploitation
Lots of links on fuzzing and Linux kernel exploitation.
Resources related to security and picking locks, safes and keys.
Machine Learning for Cyber Security
List of tools and resources related to using machine learning for cybersecurity.
Useful scripts related to malware.
Collection of multifunctional stuffing of web attacks.
A list of useful information about web application security bypassing and pentesting/capturing the flag.
Useful tricks for pentesting.
Free online library for pentesters and researchers.
Probability sorted vocabulary lists that were originally created for creating and testing passwords.
A collection of useful GitHub projects.
Articles, books on reverse engineering.
A set of tools for the radio frequency transmission protocol.
Cheat sheets for different tools and topics on information security.
A great security list for fun and profit.
List of frameworks, tools, guides, useful things in order to use the console to the fullest.
A book for the threat hunter to help develop techniques and hypotheses for trapping.