• Home
  • Categories
  • Pricing
  • Submit
    Built with
    Ever Works
    Ever Works

    Connect with us

    Stay Updated

    Get the latest updates and exclusive content delivered to your inbox.

    Product

    • Categories
    • Pricing
    • Help

    Clients

    • Sign In
    • Register
    • Forgot password?

    Company

    • About Us
    • Admin
    • Sitemap

    Resources

    • Blog
    • Submit
    • API Documentation
    All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this repository, related repositories, and associated websites are for identification purposes only. The use of these names, logos, and brands does not imply endorsement, affiliation, or sponsorship. This directory may include content generated by artificial intelligence.
    Copyright © 2025 Ever. All rights reserved.·Terms of Service·Privacy Policy·Cookies
    Decorative pattern
    Decorative pattern
    1. Home
    2. Security
    3. Awesome Cyber

    Awesome Cyber

    A curated list of cybersecurity tools useful for both blue and red team operations, covering offensive and defensive security practices, penetration testing, threat intelligence, and security automation.

    Overview

    Awesome Cyber is a comprehensive collection of cybersecurity tools and resources designed for both offensive (red team) and defensive (blue team) security operations.

    Features

    • Red Team Tools: Penetration testing frameworks, exploitation tools, and offensive security resources
    • Blue Team Tools: Defensive security tools, threat detection, and incident response resources
    • Security Automation: Scripts and tools for automating security tasks
    • Threat Intelligence: Resources for understanding and tracking threats
    • Network Security: Tools for network analysis, packet capture, and traffic inspection
    • Web Security: Web application security testing tools and frameworks
    • Cryptography: Encryption tools and cryptographic libraries

    Use Cases

    • Security professionals conducting authorized penetration tests
    • SOC analysts defending organizational infrastructure
    • Security researchers analyzing threats and vulnerabilities
    • Students learning cybersecurity practices

    Pricing

    Free and open-source repository of curated security tools and resources.

    Surveys

    Loading more......

    Information

    Websitegithub.com
    PublishedMar 12, 2026

    Categories

    1 Item
    Security

    Tags

    3 Items
    #cybersecurity#penetration-testing#red-team

    Similar Products

    6 result(s)

    Awesome Pentest Checklist

    A comprehensive, step-by-step penetration testing checklist for ethical hackers covering pre-engagement, information gathering, analysis, exploitation, post-exploitation, and reporting phases, ideal for both beginners and professionals conducting security assessments.

    Awesome Hacking

    A collection of various awesome lists for hackers, pentesters and security researchers aggregating multiple security-focused awesome lists in one place, covering everything from web security to reverse engineering.

    Awesome Pentest

    A collection of awesome penetration testing and offensive cybersecurity resources including tools for web app testing, network reconnaissance, exploitation, forensics, and CTF challenges.

    Awesome ML for Cybersecurity

    A curated list of amazingly awesome tools and resources related to the use of machine learning for cybersecurity. Includes datasets from DARPA, ADFA, NSL-KDD, research papers on malware detection, DDoS prevention, and intrusion detection systems.

    Awesome Cyber Security Resources

    A comprehensive repository for tools, guides, cheatsheets, and resources related to learning all aspects of cybersecurity, from fundamentals to advanced topics.

    Awesome Cybersecurity List

    A personal collection of awesome blog posts, write-ups, and papers focusing on cybersecurity, with dedicated sections for tools, techniques, and educational resources.