The "Awesome Hacking" project is a curated resource list designed for those interested in the field of hacking, which involves exploring and exploiting vulnerabilities in computer systems and networks. This list encompasses a wide range of categories, including penetration testing tools, ethical hacking tutorials, security research papers, and community forums. It serves as a valuable resource for beginners looking to learn the basics of cybersecurity, as well as experienced professionals seeking advanced techniques and tools. Whether you are aiming to enhance your skills or stay updated on the latest security trends, this collection offers a wealth of information to support your hacking journey.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
A Rust-based firmware analysis tool for identifying and extracting embedded files and data.
A set of tools for converting Android .dex files to Java .class files and working with Dalvik bytecode.
A declarative language to generate binary data parsers in multiple programming languages from a single format description.
A free, universal database tool and SQL client supporting over 100 databases with schema editing, ER diagrams, and AI integration.
A modern open-source Dependency Walker rewrite for Windows developers to troubleshoot DLL load dependencies.
The "Awesome Security" project is a curated collection of resources focused on enhancing security practices in the digital realm. This list encompasses a wide range of categories including security tools, libraries, frameworks, tutorials, and best practices for various platforms and technologies. It is designed to benefit security professionals, developers, and system administrators alike, providing valuable insights and tools to safeguard applications and data. Whether you are a beginner looking to understand security fundamentals or an experienced practitioner seeking advanced techniques, this project offers a wealth of information to help you improve your security posture and protect your digital assets.
The "Awesome Malware Analysis" project is a curated resource list designed to assist security professionals and researchers in the field of malware analysis. Malware analysis involves examining malicious software to understand its behavior, functionality, and impact. This list includes tools for static and dynamic analysis, reverse engineering resources, malware databases, and educational materials such as tutorials and courses. It is valuable for both beginners looking to learn the basics and experienced analysts seeking advanced techniques and tools. Users can find a wealth of resources to enhance their skills and improve their malware analysis capabilities.
The "Awesome Web Security" project is a curated collection of resources focused on the security of web applications and services. Web security encompasses practices and technologies designed to protect websites and online services from cyber threats, vulnerabilities, and attacks. This list includes tools for penetration testing, secure coding practices, frameworks, libraries, and educational materials such as articles and tutorials. It is valuable for developers, security professionals, and researchers who seek to enhance their understanding of web security and implement robust security measures. Users can find essential tools and knowledge to safeguard their web applications effectively and stay ahead of potential threats.
The "Awesome CTF" project is a curated collection of resources focused on Capture The Flag (CTF) competitions, which are events that challenge participants to solve cybersecurity problems and vulnerabilities. This list encompasses a variety of categories including CTF platforms, write-ups, tools, training materials, and community forums, catering to both newcomers and seasoned cybersecurity enthusiasts. Whether you are looking to sharpen your skills, participate in competitions, or learn from past challenges, this repository provides invaluable insights and resources. Dive into the world of CTFs and enhance your cybersecurity prowess with the tools and knowledge available here.