• Home
  • Categories
  • Pricing
  • Submit
    Built with
    Ever Works
    Ever Works

    Connect with us

    Stay Updated

    Get the latest updates and exclusive content delivered to your inbox.

    Product

    • Categories
    • Pricing
    • Help

    Clients

    • Sign In
    • Register
    • Forgot password?

    Company

    • About Us
    • Admin
    • Sitemap

    Resources

    • Blog
    • Submit
    • API Documentation
    All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this repository, related repositories, and associated websites are for identification purposes only. The use of these names, logos, and brands does not imply endorsement, affiliation, or sponsorship. This directory may include content generated by artificial intelligence.
    Copyright © 2025 Ever. All rights reserved.·Terms of Service·Privacy Policy·Cookies
    Decorative pattern
    Decorative pattern
    1. Home
    2. Security
    3. Awesome Hacking

    Awesome Hacking

    A collection of various awesome lists for hackers, pentesters and security researchers aggregating multiple security-focused awesome lists in one place, covering everything from web security to reverse engineering.

    Surveys

    Loading more......

    Information

    Websitegithub.com
    PublishedMar 15, 2026

    Categories

    1 Item
    Security

    Tags

    4 Items
    #hacking#security#pentesting#cybersecurity

    Similar Products

    6 result(s)

    Awesome Pentest

    A collection of awesome penetration testing and offensive cybersecurity resources including tools for web app testing, network reconnaissance, exploitation, forensics, and CTF challenges.

    Awesome CTF Resources

    A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started and experienced CTF players. Includes platforms, tools, writeups, and learning materials.

    Awesome-Hacker-Search-Engines

    An Awesome-style curated list of specialized search engines valuable for penetration testing, vulnerability assessment, red/blue team operations, and bug bounty work.

    Awesome Hacking Learning Path

    A comprehensive hacking learning path covering penetration testing, OSINT, Linux, networking, web application security, cryptography, exploitation, reverse engineering, forensics, CVEs, and CTF challenges, perfect for beginners and professionals mastering ethical hacking.

    Awesome Data Privacy

    A curated list of data privacy and security resources covering encryption, anonymization, and privacy-preserving technologies. Essential for building privacy-focused applications.

    Awesome Incident Response

    A curated list of tools for incident response, including specialized Linux distributions, forensic toolkits, and security monitoring solutions. Essential resources for security teams and SOCs.

    Overview

    Awesome Hacking is a meta-collection aggregating various awesome lists specifically focused on hacking, penetration testing, and security research.

    Included Awesome Lists

    Web Security

    • Awesome Web Security - Web application security
    • Awesome Web Hacking - Tools and resources
    • Awesome XSS - Cross-site scripting resources
    • Awesome SQL Injection - SQL injection techniques

    Network Security

    • Awesome Network Security - Network hardening
    • Awesome WiFi Security - Wireless security
    • Awesome Packet Sniffing - Network analysis

    Application Security

    • Awesome Android Security - Mobile app security
    • Awesome iOS Security - iOS pentesting
    • Awesome API Security - API testing

    Penetration Testing

    • Awesome Penetration Testing - Pentesting resources
    • Awesome Red Teaming - Red team operations
    • Awesome CTF - Capture the Flag resources

    Topic Areas

    Exploitation

    • Binary exploitation techniques
    • Memory corruption
    • Return-oriented programming
    • Shellcode development
    • Exploit development

    Reverse Engineering

    • Static analysis tools
    • Dynamic analysis frameworks
    • Decompilers and disassemblers
    • Debugging techniques
    • Malware analysis

    Forensics

    • Digital forensics tools
    • Memory forensics
    • Network forensics
    • Mobile forensics
    • Incident response

    Social Engineering

    • Phishing frameworks
    • Social engineering toolkits
    • OSINT (Open Source Intelligence)
    • Information gathering

    Learning Resources

    Books

    • The Hacker Playbook series
    • The Art of Exploitation
    • Black Hat Python
    • Gray Hat Hacking

    Online Platforms

    • HackTheBox
    • TryHackMe
    • Offensive Security Training
    • PentesterLab
    • VulnHub

    Certifications

    • OSCP (Offensive Security Certified Professional)
    • CEH (Certified Ethical Hacker)
    • GPEN (GIAC Penetration Tester)
    • eWPT (eLearnSecurity Web Penetration Tester)

    Tools by Category

    Reconnaissance

    • Information gathering
    • OSINT tools
    • Subdomain enumeration
    • Port scanning

    Vulnerability Analysis

  • Web scanners
  • Network scanners
  • Fuzzing tools
  • Static code analysis
  • Exploitation

    • Metasploit Framework
    • Exploit databases
    • Payload generators
    • Post-exploitation tools

    Password Attacks

    • Hash cracking
    • Brute force tools
    • Dictionary attacks
    • Rainbow tables

    Features

    • Curated list of lists
    • Comprehensive coverage
    • Regular updates
    • Community-driven
    • Educational focus
    • Ethical hacking emphasis

    Use Cases

    • Security research
    • Penetration testing
    • Bug bounty hunting
    • Security training
    • Academic research
    • CTF preparation

    Pricing

    Most resources are free and open source. Paid platforms:

    • Offensive Security courses: $999-$1,499
    • HackTheBox VIP: $10-14/month
    • TryHackMe Premium: $10.99/month