Showing 20 of 20 projects
A comprehensive collection of payloads and bypass techniques for web application security testing and penetration testing.
A comprehensive collection of payloads and bypass techniques for web application security testing and penetration testing.
A curated collection of penetration testing tools, resources, and educational materials for offensive cybersecurity professionals.
A fast, automated tool that decrypts encryptions, decodes encodings, and cracks hashes without prior knowledge of the key or cipher.
A curated collection of hacking tutorials, tools, and resources for security education and penetration testing.
A curated collection of hacking tutorials, tools, and resources for security professionals and enthusiasts.
A Python CTF framework and exploit development library designed for rapid prototyping and security research.
A curated collection of web security resources, tools, and research materials for learning penetration techniques.
A curated list of Capture The Flag (CTF) frameworks, libraries, resources, software, and tutorials for security enthusiasts.
A curated list of Capture The Flag (CTF) frameworks, libraries, resources, software, and tutorials for security enthusiasts.
A GDB and LLDB plug-in that enhances debugging for exploit development, reverse engineering, and low-level software development.
GEF is a modern GDB enhancement providing advanced debugging features for exploit developers and reverse engineers on Linux.
A customizable, easy-to-use Capture The Flag framework for running cybersecurity competitions.
An open-source platform for hosting Jeopardy and King of the Hill style Capture the Flag competitions.
Course materials for a university-level class on vulnerability research, reverse engineering, and binary exploitation.
A university course repository teaching vulnerability research, reverse engineering, and binary exploitation through hands-on labs.
A framework that generates randomly vulnerable virtual machines for security education, labs, and CTF events.
A command-line tool that finds one-gadget RCE (execve('/bin/sh')) offsets in libc binaries for CTF pwn challenges.
A deliberately vulnerable CI/CD environment with 11 challenges to learn and practice CI/CD security.
A modern hash identification tool that names MD5, SHA256, and 300+ other hash types with popularity ratings and summaries.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.