Awesome-Hacking-Resources

Hacking guide

A collection of resources for learning and practicing hacking and penetration testing skills

A collection of hacking / penetration testing resources to make you better!

GitHub

15k stars
695 watching
2k forks
last commit: 9 months ago
Linked from 3 awesome lists

buffer-overflowctfexploithackingmalwaremitmowasppenetration-testingprivilege-escalationprivilege-escalation-linuxreverse-engineeringwindows-privilege-escalation

Awesome Hacking Resources / Table of Contents / Learning the Skills

CS 642: Intro to Computer Security
CyberSec WTF
Cybrary
Free Cyber Security Training
Hak5
Hopper's Roppers Security Training
Learning Exploitation with Offensive Computer Security 2.0
Mind Maps
MIT OCW 6.858 Computer Systems Security
OffensiveComputerSecurity
OWASP top 10 web security risks
SecurityTube
Seed Labs
TryHackMe

Awesome Hacking Resources / Table of Contents / YouTube Channels

0patch by ACROS Security
BlackHat
Christiaan008
Detectify
Hak5
Kaspersky Lab
Metasploit
ntop
nVisium
OpenNSM
OWASP
Rapid7
Securelist
Segment Security
SocialEngineerOrg
Sonatype
SophosLabs
Sourcefire
Station X
Synack
TippingPoint Zero Day Initiative
Tripwire, Inc.
Vincent Yiu
44contv
MIT OCW 6.858 Computer Systems Security
BruCON Security Conference
BSides Manchester
BSidesAugusta
CarolinaCon
Cort Johnson
DevSecCon
Garage4Hackers - Information Security
HACKADAY
Hack In The Box Security Conference
Hack in Paris
Hacklu
Hacktivity
Hardwear.io
IEEE Symposium on Security and Privacy
LASCON
leHACK
Marcus Niemietz
Media.ccc.de
NorthSec
Pancake Nopcode
Psiinon
SJSU Infosec
Secappdev.org
Security Fest
SecurityTubeCons
ToorCon
USENIX Enigma Conference
ZeroNights
0x41414141
Adrian Crenshaw
Corey Nachreiner
BalCCon - Balkan Computer Congress
danooct1
DedSec
DEFCON Conference
DemmSec
Derek Rook - CTF/Boot2root/wargames Walkthrough
Don Does 30
Error 404 Cyber News
Geeks Fort - KIF
GynvaelEN
HackerSploit
HACKING TUTORIALS
iExplo1t
JackkTutorials
John Hammond
Latest Hacking News
LionSec
LiveOverflow
Metasploitation
NetSecNow
Open SecurityTraining
Pentester Academy TV
Penetration Testing in Linux
rwbnetsec
Samy Kamkar's Applied Hacking
SecureNinjaTV
Security Weekly
Seytonic
Shozab Haxor
SSTec Tutorials
Tradecraft Security Weekly
Troy Hunt
Waleed Jutt
webpwnized
Zer0Mem0ry
LionSec
Adrian Crenshaw
HackerSploit
Derek Rook - CTF/Boot2root/wargames Walkthrough
Tradecraft Security Weekly
IPPSec
The Daily Swig

Awesome Hacking Resources / Table of Contents / Sharpening Your Skills

Backdoor
The cryptopals crypto challenges
Challenge Land
Crackmes.de Archive (2011-2015)
Crackmes.one
CTFLearn
CTFs write-ups
CTF365
The enigma group
Exploit exercises
Google CTF 4,529 11 days ago
Google CTF 2019
Google's XSS game
Hack The Box
Hacker test
Hacker Gateway
Hacksplaining
hackburger.ee
Hack.me
Hack this site!
knock.xss.moe
Lin.security
noe.systems
Over the wire
Participating Challenge Sites
PentesterLab
Pentestit
Pentest Practice
Pentest.training
PicoCTF
pwnable.kr
pwnable.tw
Ringzer0 Team
ROP Emporium
SmashTheStack
Shellter Labs
Solve Me
Vulnhub
websec.fr
tryhackme
webhacking.kr
Stereotyped Challenges
Stripe CTF 2.0
Windows / Linux Local Privilege Escalation Workshop 1,879 about 2 years ago
Hacking Articles
Hacker101 CTF
Hacking Lab
Portswigger

Awesome Hacking Resources / Table of Contents / Reverse Engineering, Buffer Overflow and Exploit Development

A Course on Intermediate Level Linux Exploitation 988 about 4 years ago
Analysis and exploitation (unprivileged)
Binary hacking
Buffer Overflow Exploitation Megaprimer for Linux
Corelan tutorials
Exploit tutorials
Exploit development
flAWS challenge
Introduction to ARM Assembly Basics
Introductory Intel x86
Lena's Reversing for Newbies (Complete)
Linux (x86) Exploit Development Series
Megabeets journey into Radare2
Modern Binary Exploitation - CSCI 4968 5,477 almost 3 years ago
Recon.cx - reversing conference
Reverse Engineering for Beginners
Reverse engineering reading list 2,350 over 1 year ago
Reverse Engineering challenges
Reverse Engineering for beginners (GitHub project)
Reverse Engineering Malware 101
Reverse Engineering Malware 102
reversing.kr challenges
Shell storm
Shellcode Injection
Micro Corruption — Assembly

Awesome Hacking Resources / Table of Contents / Privilege Escalation

4 Ways get linux privilege escalation
A GUIDE TO LINUX PRIVILEGE ESCALATION
Abusing SUDO (Linux Privilege Escalation)
AutoLocalPrivilegeEscalation 486 about 3 years ago
Basic linux privilege escalation
Common Windows Privilege Escalation Vectors
Editing /etc/passwd File for Privilege Escalation
Linux Privilege Escalation
Linux Privilege Escalation Check Script 1,569 almost 3 years ago
Linux Privilege Escalation Scripts
Linux Privilege Escalation Using PATH Variable
Linux Privilege Escalation using Misconfigured NFS
Linux Privilege Escalation via Dynamically Linked Shared Object Library
Local Linux Enumeration & Privilege Escalation Cheatsheet
OSCP - Windows Priviledge Escalation
Privilege escalation for Windows and Linux
Privilege escalation linux with live example
Reach the root
RootHelper 485 over 3 years ago
Unix privesc checker
Windows exploits, mostly precompiled. 1,831 about 4 years ago
Windows Privilege Escalation
Windows Privilege Escalation
Windows privilege escalation checker 2,509 3 months ago
Windows Privilege Escalation Fundamentals
Windows Privilege Escalation Guide
Windows Privilege Escalation Methods for Pentesters

Awesome Hacking Resources / Table of Contents / Malware Analysis

Malware traffic analysis
Malware Analysis - CSCI 4976 3,767 about 2 years ago
https://www.badbinaries.com/ [Bad Binaries] ( )

Awesome Hacking Resources / Table of Contents / Network Scanning / Reconnaissance

Foot Printing with WhoIS/DNS records
Google Dorks/Google Hacking

Awesome Hacking Resources / Table of Contents / Vulnerable Web Application

bWAPP
Damn Small Vulnerable Web 785 5 months ago
Damn Vulnerable Web Application (DVWA)
Google Gruyere
OWASP Broken Web Applications Project 294 9 months ago
OWASP Hackademic Challenges project 319 about 4 years ago
OWASP Mutillidae II
OWASP Juice Shop 10,466 12 days ago
WebGoat: A deliberately insecure Web Application 7,036 10 days ago

Awesome Hacking Resources / Table of Contents / Vulnerable OS

General Test Environment Guidance
Metasploitable2 (Linux)
Metasploitable3 4,764 5 months ago [ ]
Vulnhub

Awesome Hacking Resources / Table of Contents / Linux Penetration Testing OS

Android Tamer
BackBox
BlackArch
Bugtraq
Docker for pentest 728 over 2 years ago
Kali
LionSec Linux
Parrot
Pentoo

Awesome Hacking Resources / Table of Contents / Exploits

0day.today
Exploit Database
CXsecurity
Snyk Vulnerability DB

Awesome Hacking Resources / Table of Contents / Forums

0x00sec
Antichat
CODEBY.NET
EAST Exploit database
Greysec
Hackforums
4Hat Day
CaveiraTech

Awesome Hacking Resources / Table of Contents / Archived Security Conference Videos

InfoCon.org
Irongeek
infocondb.org

Awesome Hacking Resources / Table of Contents / Online Communities

Hacktoday
Hack+
MPGH

Awesome Hacking Resources / Table of Contents / Online News Sources

InfoSec
Recent Hash Leaks
Security Intell
Threatpost
Secjuice
The Hacker News

Backlinks from these awesome lists:

More related projects: