2020-09-30 20:47:19 +00:00
# Awesome Hacking -An Amazing Project [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
2014-12-16 12:16:22 +00:00
2014-12-17 05:34:54 +00:00
A curated list of awesome Hacking. Inspired by [awesome-machine-learning ](https://github.com/josephmisiti/awesome-machine-learning/ )
2014-12-16 12:16:22 +00:00
2015-11-14 03:33:25 +00:00
If you want to contribute to this list (please do), send me a pull request or contact me [@carpedm20 ](https://twitter.com/carpedm20 )
2014-12-17 05:34:54 +00:00
2016-04-21 15:50:54 +00:00
For a list of free hacking books available for download, go [here ](https://github.com/Hack-with-Github/Free-Security-eBooks )
2014-12-17 05:34:54 +00:00
## Table of Contents
<!-- MarkdownTOC depth=4 -->
2014-12-16 12:16:22 +00:00
- [System ](#system )
2018-08-30 00:34:39 +00:00
- [Tutorials ](#tutorials )
- [Tools ](#tools )
- [Docker ](#docker-images-for-penetration-testing--security )
- [General ](#general )
2014-12-17 05:34:54 +00:00
- [Reverse Engineering ](#reverse-engineering )
2018-08-30 00:34:39 +00:00
- [Tutorials ](#tutorials-1 )
- [Tools ](#tools-1 )
- [General ](#general-1 )
2014-12-16 12:16:22 +00:00
- [Web ](#web )
2018-08-30 00:34:39 +00:00
- [Tools ](#tools-2 )
2019-03-08 07:54:52 +00:00
- [General ](#general-2 )
2014-12-16 12:16:22 +00:00
- [Network ](#network )
2018-08-30 00:34:39 +00:00
- [Tools ](#tools-3 )
2014-12-16 12:41:40 +00:00
- [Forensic ](#forensic )
2018-08-30 00:34:39 +00:00
- [Tools ](#tools-4 )
2014-12-16 12:41:40 +00:00
- [Cryptography ](#cryptography )
2018-08-30 00:34:39 +00:00
- [Tools ](#tools-5 )
2014-12-16 12:16:22 +00:00
- [Wargame ](#wargame )
2018-08-30 00:34:39 +00:00
- [System ](#system-1 )
- [Reverse Engineering ](#reverse-engineering-1 )
- [Web ](#web-1 )
- [Cryptography ](#cryptography-1 )
- [Bug bounty ](#bug-bounty )
2014-12-17 05:34:54 +00:00
- [CTF ](#ctf )
2018-08-30 00:34:39 +00:00
- [Competition ](#competition )
- [General ](#general-2 )
2017-02-15 20:02:46 +00:00
- [OS ](#os )
2018-01-19 09:54:08 +00:00
- [Online resources ](#online-resources )
2018-10-09 01:25:13 +00:00
- [Post exploitation ](#post-exploitation )
- [tools ](#tools-6 )
2017-01-02 08:43:42 +00:00
- [ETC ](#etc )
2014-12-17 05:34:54 +00:00
<!-- /MarkdownTOC -->
2014-12-16 12:22:09 +00:00
# System
2014-12-16 12:16:22 +00:00
2014-12-17 05:34:54 +00:00
## Tutorials
* [Corelan Team's Exploit writing tutorial ](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ )
* [Exploit Writing Tutorials for Pentesters ](http://www.punter-infosec.com/exploit-writing-tutorials-for-pentesters/ )
2018-05-01 13:26:13 +00:00
* [Understanding the basics of Linux Binary Exploitation ](https://github.com/r0hi7/BinExp )
2020-05-23 04:31:16 +00:00
* [Shells ](https://www.youtube.com/playlist?list=PLyzOVJj3bHQuloKGG59rS43e29ro7I57J )
* [Missing Semester ](https://missing.csail.mit.edu/2020/course-shell/ )
2014-12-17 05:34:54 +00:00
## Tools
* [Metasploit ](https://github.com/rapid7/metasploit-framework ) A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
* [mimikatz ](https://github.com/gentilkiwi/mimikatz ) - A little tool to play with Windows security
2020-05-23 04:31:16 +00:00
* [Hackers tools ](https://www.youtube.com/playlist?list=PLyzOVJj3bHQuiujH1lpn8cA9dsyulbYRv ) - Tutorial on tools.
2014-12-16 12:16:22 +00:00
2017-01-02 08:43:42 +00:00
### Docker Images for Penetration Testing & Security
* `docker pull kalilinux/kali-linux-docker` [official Kali Linux ](https://hub.docker.com/r/kalilinux/kali-linux-docker/ )
* `docker pull owasp/zap2docker-stable` - [official OWASP ZAP ](https://github.com/zaproxy/zaproxy )
* `docker pull wpscanteam/wpscan` - [official WPScan ](https://hub.docker.com/r/wpscanteam/wpscan/ )
2020-11-02 23:57:14 +00:00
* `docker pull metasploitframework/metasploit-framework
` - [Official Metasploit ](https://hub.docker.com/r/metasploitframework/metasploit-framework/ )
2017-01-02 08:43:42 +00:00
* `docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA) ](https://hub.docker.com/r/citizenstig/dvwa/ )
* `docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation ](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/ )
* `docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock ](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/ )
* `docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed ](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/ )
* `docker pull opendns/security-ninjas` - [Security Ninjas ](https://hub.docker.com/r/opendns/security-ninjas/ )
* `docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester ](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/ )
* `docker pull diogomonica/docker-bench-security` - [Docker Bench for Security ](https://hub.docker.com/r/diogomonica/docker-bench-security/ )
* `docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd ](https://hub.docker.com/r/ismisepaul/securityshepherd/ )
* `docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image ](https://hub.docker.com/r/danmx/docker-owasp-webgoat/ )
2020-07-31 02:11:24 +00:00
* `docker pull vulnerables/web-owasp-nodegoat` - [OWASP NodeGoat ](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker )
2017-01-02 08:43:42 +00:00
* `docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application ](https://hub.docker.com/r/citizenstig/nowasp/ )
* `docker pull bkimminich/juice-shop` - [OWASP Juice Shop ](https://github.com/bkimminich/juice-shop#docker-container-- )
2018-10-07 10:53:57 +00:00
* `docker pull phocean/msf` - [Docker Metasploit ](https://hub.docker.com/r/phocean/msf/ )
2014-12-16 12:16:22 +00:00
2014-12-17 05:47:05 +00:00
## General
2015-11-14 03:33:25 +00:00
* [Exploit database ](https://www.exploit-db.com/ ) - An ultimate archive of exploits and vulnerable software
2014-12-17 05:47:05 +00:00
2014-12-17 05:34:54 +00:00
2014-12-16 12:22:09 +00:00
# Reverse Engineering
2014-12-16 12:16:22 +00:00
2014-12-16 12:22:09 +00:00
## Tutorials
2020-06-20 21:27:42 +00:00
* [Begin RE: A Reverse Engineering Tutorial Workshop ](https://www.begin.re/the-workshop )
2014-12-17 05:34:54 +00:00
* [Malware Analysis Tutorials: a Reverse Engineering Approach ](http://fumalwareanalysis.blogspot.kr/p/malware-analysis-tutorials-reverse.html )
2020-06-20 21:27:42 +00:00
* [Malware Unicorn Reverse Engineering Tutorial ](https://malwareunicorn.org/workshops/re101.html#0 )
2014-12-16 12:16:22 +00:00
2014-12-16 12:22:09 +00:00
## Tools
2018-10-20 16:09:55 +00:00
### Disassemblers and debuggers
2014-12-17 05:34:54 +00:00
* [IDA ](https://www.hex-rays.com/products/ida/ ) - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
* [OllyDbg ](http://www.ollydbg.de/ ) - A 32-bit assembler level analysing debugger for Windows
2018-10-20 16:09:55 +00:00
* [x64dbg ](https://github.com/x64dbg/x64dbg ) - An open-source x64/x32 debugger for Windows
2015-10-11 05:59:11 +00:00
* [radare2 ](https://github.com/radare/radare2 ) - A portable reversing framework
2016-07-03 09:42:08 +00:00
* [plasma ](https://github.com/joelpx/plasma ) - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
2017-02-04 06:31:02 +00:00
* [ScratchABit ](https://github.com/pfalcon/ScratchABit ) - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
2018-10-20 16:09:55 +00:00
* [Capstone ](https://github.com/aquynh/capstone )
2020-10-23 00:04:02 +00:00
* [Ghidra ](https://ghidra-sre.org/ ) - A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission
2018-10-20 16:09:55 +00:00
### Decompilers
* JVM-based languages
* [Krakatau ](https://github.com/Storyyeller/Krakatau ) - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
2019-06-10 13:36:41 +00:00
* [JD-GUI ](https://github.com/java-decompiler/jd-gui )
2018-10-20 16:09:55 +00:00
* [procyon ](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler )
* [Luyten ](https://github.com/deathmarine/Luyten ) - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
* [JAD ](http://varaneckas.com/jad/ ) - JAD Java Decompiler (closed-source, unmaintained)
* [JADX ](https://github.com/skylot/jadx ) - a decompiler for Android apps. Not related to JAD.
* .net-based languages
* [dotPeek ](https://www.jetbrains.com/decompiler/ ) - a free-of-charge .NET decompiler from JetBrains
* [ILSpy ](https://github.com/icsharpcode/ILSpy/ ) - an open-source .NET assembly browser and decompiler
* [dnSpy ](https://github.com/0xd4d/dnSpy ) - .NET assembly editor, decompiler, and debugger
* native code
* [Hopper ](https://www.hopperapp.com ) - A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables.
* [cutter ](https://github.com/radareorg/cutter ) - a decompiler based on radare2.
* [retdec ](https://github.com/avast-tl/retdec )
* [snowman ](https://github.com/yegord/snowman )
* [Hex-Rays ](https://www.hex-rays.com/products/decompiler/ )
2019-06-10 13:36:41 +00:00
* Python
* [uncompyle6 ](https://github.com/rocky/python-uncompyle6 ) - decompiler for the over 20 releases and 20 years of CPython.
2018-10-20 16:09:55 +00:00
### Deobfuscators
* [de4dot ](https://github.com/0xd4d/de4dot ) - .NET deobfuscator and unpacker.
* [JS Beautifier ](https://github.com/beautify-web/js-beautify )
* [JS Nice ](http://jsnice.org/ ) - a web service guessing JS variables names and types based on the model derived from open source.
### Other
* [nudge4j ](https://github.com/lorenzoongithub/nudge4j ) - Java tool to let the browser talk to the JVM
* [dex2jar ](https://github.com/pxb1988/dex2jar ) - Tools to work with Android .dex and Java .class files
* [androguard ](https://code.google.com/p/androguard/ ) - Reverse engineering, malware and goodware analysis of Android applications
* [antinet ](https://github.com/0xd4d/antinet ) - .NET anti-managed debugger and anti-profiler code
* [UPX ](http://upx.sourceforge.net/ ) - the Ultimate Packer (and unpacker) for eXecutables
### Execution logging and tracing
* [Wireshark ](https://www.wireshark.org/ ) - A free and open-source packet analyzer
* [tcpdump ](http://www.tcpdump.org/ ) - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
* [mitmproxy ](https://github.com/mitmproxy/mitmproxy ) - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
* [Charles Proxy ](https://charlesproxy.com ) - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
* [usbmon ](https://www.kernel.org/doc/Documentation/usb/usbmon.txt ) - USB capture for Linux.
* [USBPcap ](https://github.com/desowin/usbpcap ) - USB capture for Windows.
* [dynStruct ](https://github.com/ampotos/dynStruct ) - structures recovery via dynamic instrumentation.
* [drltrace ](https://github.com/mxmssh/drltrace ) - shared library calls tracing.
2014-12-16 12:41:40 +00:00
2018-10-20 16:09:55 +00:00
### Binary files examination and editing
2017-02-23 10:42:09 +00:00
2018-10-20 16:09:55 +00:00
#### Hex editors
* [HxD ](http://mh-nexus.de/en/hxd/ ) - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
* [WinHex ](http://www.winhex.com/winhex/ ) - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
* [wxHexEditor ](https://github.com/EUA/wxHexEditor )
2019-06-10 13:36:41 +00:00
* [Synalize It ](https://www.synalysis.net/ )/[Hexinator](https://hexinator.com/) -
2018-10-20 16:09:55 +00:00
#### Other
* [Binwalk ](https://github.com/ReFirmLabs/binwalk ) - Detects signatures, unpacks archives, visualizes entropy.
* [Veles ](https://github.com/codilime/veles ) - a visualizer for statistical properties of blobs.
2020-09-30 12:18:30 +00:00
* [Kaitai Struct ](https://github.com/kaitai-io/kaitai_struct ) - a DSL for creating parsers in a variety of programming languages. The Web IDE is particularly useful for reverse-engineering.
2018-10-20 16:09:55 +00:00
* [Protobuf inspector ](https://github.com/jmendeth/protobuf-inspector )
* [DarunGrim ](https://github.com/ohjeongwook/DarunGrim ) - executable differ.
* [DBeaver ](https://github.com/dbeaver/dbeaver ) - a DB editor.
* [Dependencies ](https://github.com/lucasg/Dependencies ) - a FOSS replacement to Dependency Walker.
* [PEview ](http://wjradburn.com/software/ ) - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
* [BinText ](https://web.archive.org/web/http://www.mcafee.com/kr/downloads/free-tools/bintext.aspx ) - A small, very fast and powerful text extractor that will be of particular interest to programmers.
2017-02-23 10:42:09 +00:00
2014-12-17 05:47:05 +00:00
## General
* [Open Malware ](http://www.offensivecomputing.net/ )
2014-12-16 12:22:09 +00:00
# Web
## Tools
2019-11-14 10:57:48 +00:00
* [Spyse ](https://spyse.com/ ) - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
2014-12-17 06:05:50 +00:00
* [sqlmap ](https://github.com/sqlmapproject/sqlmap ) - Automatic SQL injection and database takeover tool
2018-06-25 06:53:43 +00:00
* [NoSQLMap ](https://github.com/codingo/NoSQLMap ) - Automated NoSQL database enumeration and web application exploitation tool.
2014-12-16 12:41:40 +00:00
* [tools.web-max.ca ](http://tools.web-max.ca/encode_decode.php ) - base64 base85 md4,5 hash, sha1 hash encoding/decoding
2018-06-25 06:53:43 +00:00
* [VHostScan ](https://github.com/codingo/VHostScan ) - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
* [SubFinder ](https://github.com/subfinder/subfinder ) - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
2019-11-14 10:57:48 +00:00
* [Findsubdomains ](https://findsubdomains.com/ ) - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
2018-11-13 08:58:12 +00:00
* [badtouch ](https://github.com/kpcyrd/badtouch ) - Scriptable network authentication cracker
2020-08-26 12:43:50 +00:00
* [PhpSploit ](https://github.com/nil0x42/phpsploit ) - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner
2020-10-02 05:46:16 +00:00
* [Git-Scanner ](https://github.com/HightechSec/git-scanner ) - A tool for bug hunting or pentesting for targeting websites that have open `.git` repositories available in public
2014-12-16 12:16:22 +00:00
2019-03-08 07:54:52 +00:00
## General
* [Strong node.js ](https://github.com/jesusprubio/strong-node ) - An exhaustive checklist to assist in the source code security analysis of a node.js web service.
2014-12-16 12:22:09 +00:00
# Network
## Tools
2014-12-16 12:41:40 +00:00
* [NetworkMiner ](http://www.netresec.com/?page=NetworkMiner ) - A Network Forensic Analysis Tool (NFAT)
2017-03-27 10:14:36 +00:00
* [Paros ](http://sourceforge.net/projects/paros/ ) - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
2016-03-13 18:52:18 +00:00
* [pig ](https://github.com/rafael-santiago/pig ) - A Linux packet crafting tool
2019-09-05 15:51:24 +00:00
* [findsubdomains ](https://findsubdomains.com ) - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
* [cirt-fuzzer ](http://www.cirt.dk/ ) - A simple TCP/UDP protocol fuzzer.
* [ASlookup ](https://aslookup.com/ ) - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
2014-12-16 12:41:40 +00:00
* [ZAP ](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project ) - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
2017-03-27 10:14:36 +00:00
* [mitmsocks4j ](https://github.com/Akdeniz/mitmsocks4j ) - Man-in-the-middle SOCKS Proxy for Java
2018-06-15 20:49:06 +00:00
* [ssh-mitm ](https://github.com/jtesta/ssh-mitm ) - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
2015-11-14 03:33:25 +00:00
* [nmap ](https://nmap.org/ ) - Nmap (Network Mapper) is a security scanner
2014-12-17 05:58:50 +00:00
* [Aircrack-ng ](http://www.aircrack-ng.org/ ) - An 802.11 WEP and WPA-PSK keys cracking program
2018-08-30 00:34:39 +00:00
* [Nipe ](https://github.com/GouveaHeitor/nipe ) - A script to make Tor Network your default gateway.
2017-09-16 16:19:53 +00:00
* [Habu ](https://github.com/portantier/habu ) - Python Network Hacking Toolkit
2017-10-22 19:31:04 +00:00
* [Wifi Jammer ](https://n0where.net/wifijammer/ ) - Free program to jam all wifi clients in range
* [Firesheep ](https://codebutler.github.io/firesheep/ ) - Free program for HTTP session hijacking attacks.
2020-04-08 10:16:32 +00:00
* [Scapy ](https://github.com/secdev/awesome-scapy ) - A Python tool and library for low level packet creation and manipulation
2018-07-26 01:36:48 +00:00
* [Amass ](https://github.com/OWASP/Amass ) - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
2018-11-13 08:58:12 +00:00
* [sniffglue ](https://github.com/kpcyrd/sniffglue ) - Secure multithreaded packet sniffer
2020-08-04 22:56:36 +00:00
* [RustScan][https://github.com/rustscan/rustscan] - Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port enumeration in a fraction of the time.
2014-12-17 05:58:50 +00:00
2014-12-16 12:16:22 +00:00
2014-12-16 12:41:40 +00:00
# Forensic
## Tools
2018-05-11 00:34:07 +00:00
* [Autopsy ](http://www.sleuthkit.org/autopsy/ ) - A digital forensics platform and graphical interface to [The Sleuth Kit ](http://www.sleuthkit.org/sleuthkit/index.php ) and other digital forensics tools
2017-03-27 10:14:36 +00:00
* [sleuthkit ](https://github.com/sleuthkit/sleuthkit ) - A library and collection of command-line digital forensics tools
* [EnCase ](https://www.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx ) - The shared technology within a suite of digital investigations products by Guidance Software
2014-12-17 05:34:54 +00:00
* [malzilla ](http://malzilla.sourceforge.net/ ) - Malware hunting tool
2019-10-11 17:17:59 +00:00
* [IPED - Indexador e Processador de Evidências Digitais ](https://servicos.dpf.gov.br/ferramentas/IPED/ ) - Brazilian Federal Police Tool for Forensic Investigation
2014-12-17 05:34:54 +00:00
2014-12-16 12:41:40 +00:00
# Cryptography
2014-12-17 05:58:50 +00:00
### Tools
2017-03-27 10:14:36 +00:00
* [xortool ](https://github.com/hellman/xortool ) - A tool to analyze multi-byte XOR cipher
2014-12-17 05:58:50 +00:00
* [John the Ripper ](http://www.openwall.com/john/ ) - A fast password cracker
2014-12-17 06:28:59 +00:00
* [Aircrack ](http://www.aircrack-ng.org/ ) - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
2020-08-04 22:56:36 +00:00
* [Ciphey ](https://github.com/ciphey/ciphey ) - Automated decryption tool using artificial intelligence & natural language processing.
2014-12-17 05:58:50 +00:00
2014-12-16 12:41:40 +00:00
2014-12-16 12:22:09 +00:00
# Wargame
## System
2014-12-16 12:41:40 +00:00
* [OverTheWire - Semtex ](http://overthewire.org/wargames/semtex/ )
* [OverTheWire - Vortex ](http://overthewire.org/wargames/vortex/ )
* [OverTheWire - Drifter ](http://overthewire.org/wargames/drifter/ )
* [pwnable.kr ](http://pwnable.kr/ ) - Provide various pwn challenges regarding system security
2014-12-17 05:34:54 +00:00
* [Exploit Exercises - Nebula ](https://exploit-exercises.com/nebula/ )
2014-12-16 12:41:40 +00:00
* [SmashTheStack ](http://smashthestack.org/ )
2019-10-07 07:57:28 +00:00
* [HackingLab ](https://www.hacking-lab.com/ )
2014-12-16 12:16:22 +00:00
2014-12-17 05:34:54 +00:00
## Reverse Engineering
2014-12-16 12:41:40 +00:00
* [Reversing.kr ](http://www.reversing.kr/ ) - This site tests your ability to Cracking & Reverse Code Engineering
* [CodeEngn ](http://codeengn.com/challenges/ ) - (Korean)
2014-12-17 05:34:54 +00:00
* [simples.kr ](http://simples.kr/ ) - (Korean)
2016-05-14 15:19:50 +00:00
* [Crackmes.de ](http://crackmes.de/ ) - The world first and largest community website for crackmes and reversemes.
2014-12-16 12:16:22 +00:00
2014-12-16 12:22:09 +00:00
## Web
2014-12-16 12:16:22 +00:00
* [Hack This Site! ](https://www.hackthissite.org/ ) - a free, safe and legal training ground for hackers to test and expand their hacking skills
2018-03-30 08:47:33 +00:00
* [Hack The Box ](https://www.hackthebox.eu ) - a free site to perform pentesting in a variety of different systems.
2014-12-16 12:16:22 +00:00
* [Webhacking.kr ](http://webhacking.kr/ )
2015-11-14 03:33:25 +00:00
* [0xf.at ](https://0xf.at/ ) - a website without logins or ads where you can solve password-riddles (so called hackits).
2019-10-04 16:27:56 +00:00
* [fuzzy.land ](https://fuzzy.land/ ) - Website by an Austrian group. Lots of challenges taken from CTFs they participated in.
2018-05-30 18:10:05 +00:00
* [Gruyere ](https://google-gruyere.appspot.com/ )
* [Others ](https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=On-Line_apps )
2021-02-16 18:17:00 +00:00
* [CSP Scanner ](https://cspscanner.com/ ) - Analyze a site's Content-Security-Policy (CSP) to find bypasses and missing directives.
2014-12-16 12:16:22 +00:00
2014-12-16 12:41:40 +00:00
## Cryptography
* [OverTheWire - Krypton ](http://overthewire.org/wargames/krypton/ )
2017-10-28 11:33:18 +00:00
## Bug bounty
2018-05-11 00:34:07 +00:00
* [Awesome bug bounty resources by EdOverflow ](https://github.com/EdOverflow/bugbounty-cheatsheet )
2019-06-10 13:36:41 +00:00
## Bug bounty - Earn Some Money
2018-10-29 16:36:34 +00:00
* [Bugcrowd ](https://www.bugcrowd.com/ )
* [Hackerone ](https://www.hackerone.com/start-hacking )
2019-06-10 13:36:41 +00:00
2014-12-16 12:22:09 +00:00
# CTF
2014-12-17 05:34:54 +00:00
## Competition
2014-12-16 12:16:22 +00:00
* [DEF CON ](https://legitbs.net/ )
* [CSAW CTF ](https://ctf.isis.poly.edu/ )
2014-12-17 05:34:54 +00:00
* [hack.lu CTF ](http://hack.lu/ )
* [Pliad CTF ](http://www.plaidctf.com/ )
2014-12-17 05:47:05 +00:00
* [RuCTFe ](http://ructf.org/e/ )
* [Ghost in the Shellcode ](http://ghostintheshellcode.com/ )
2015-11-14 03:33:25 +00:00
* [PHD CTF ](http://www.phdays.com/ )
2014-12-17 05:47:05 +00:00
* [SECUINSIDE CTF ](http://secuinside.com/ )
* [Codegate CTF ](http://ctf.codegate.org/html/Main.html?lang=eng )
* [Boston Key Party CTF ](http://bostonkeyparty.net/ )
2018-06-23 21:29:38 +00:00
* [ZeroDays CTF ](https://zerodays.ie/ )
* [Insomni’ hack ](https://insomnihack.ch/ )
2019-06-10 13:36:41 +00:00
* [Pico CTF ](https://picoctf.com/ )
2020-09-30 12:19:35 +00:00
* [prompt(1) to win ](http://prompt.ml/ ) - XSS Challenges
2019-10-15 09:48:04 +00:00
* [HackTheBox ](https://www.hackthebox.eu/ )
2014-12-17 05:34:54 +00:00
2014-12-17 05:58:50 +00:00
## General
2017-05-23 03:08:18 +00:00
* [Hack+ ](http://hack.plus ) - An Intelligent network of bots that fetch the latest InfoSec content.
2014-12-17 05:34:54 +00:00
* [CTFtime.org ](https://ctftime.org/ ) - All about CTF (Capture The Flag)
* [WeChall ](http://www.wechall.net/ )
2015-11-14 03:33:25 +00:00
* [CTF archives (shell-storm) ](http://shell-storm.org/repo/CTF/ )
2016-11-01 01:45:58 +00:00
* [Rookit Arsenal ](https://amzn.com/144962636X ) - OS RE and rootkit development
2017-03-05 22:56:33 +00:00
* [Pentest Cheat Sheets ](https://github.com/coreb1t/awesome-pentest-cheat-sheets ) - Collection of cheat sheets useful for pentesting
2018-05-11 00:34:07 +00:00
* [Movies For Hackers ](https://github.com/k4m4/movies-for-hackers ) - A curated list of movies every hacker & cyberpunk must watch.
2020-04-09 19:31:22 +00:00
* [Hopper's Roppers Intro. to CTF Course ](https://www.hoppersroppers.org/courseCTF.html ) - A free course that teaches the fundamentals of forensics, cryptography, and web-exploitation required to be successful in Capture the Flag competitions.
2014-12-17 05:58:50 +00:00
2017-02-15 20:02:46 +00:00
# OS
2017-02-22 19:56:03 +00:00
## Online resources
2017-02-15 20:02:46 +00:00
* [Security related Operating Systems @ Rawsec ](http://rawsec.ml/en/security-related-os/ ) - Complete list of security related operating systems
* [Best Linux Penetration Testing Distributions @ CyberPunk ](https://n0where.net/best-linux-penetration-testing-distributions/ ) - Description of main penetration testing distributions
2017-02-15 20:22:46 +00:00
* [Security @ Distrowatch ](http://distrowatch.com/search.php?category=Security ) - Website dedicated to talking about, reviewing and keeping up to date with open source operating systems
2018-10-09 01:25:13 +00:00
# Post exploitation
## tools
* [empire ](https://github.com/EmpireProject/Empire ) - A post exploitation framework for powershell and python.
* [silenttrinity ](https://github.com/byt3bl33d3r/SILENTTRINITY ) - A post exploitation tool that uses iron python to get past powershell restrictions.
2019-08-09 16:12:06 +00:00
* [PowerSploit ](https://github.com/PowerShellMafia/PowerSploit ) - A PowerShell post exploitation framework
2019-10-15 09:48:04 +00:00
* [ebowla ](https://github.com/Genetic-Malware/Ebowla ) - Framework for Making Environmental Keyed Payloads
2017-02-15 20:02:46 +00:00
2014-12-17 06:05:50 +00:00
# ETC
2014-12-17 05:58:50 +00:00
* [SecTools ](http://sectools.org/ ) - Top 125 Network Security Tools
2020-04-09 19:31:22 +00:00
* [Hopper's Roppers Security Training ](https://www.hoppersroppers.org/training.html ) - Four free courses designed to teach beginners the fundamentals of computing, security, and CTFs.