2014-12-16 12:16:22 +00:00
|
|
|
# Awesome Hacking
|
|
|
|
|
|
|
|
A curated list of awesome Hacking. Inspired by [awesome-python](https://github.com/vinta/awesome-python).
|
|
|
|
|
|
|
|
### Contents
|
|
|
|
|
|
|
|
- [System](#system)
|
|
|
|
- [Bug bounty](#bug-bounty)
|
|
|
|
- [Reverse engineering](#reverse-engineering)
|
|
|
|
- [Messanger](#messagner)
|
|
|
|
- [Tools](#reverse-engineering-tools)
|
|
|
|
- [Web](#web)
|
|
|
|
- [Tools](#web-tools)
|
|
|
|
- [Network](#network)
|
|
|
|
- [Tutorials](#network-tutorials)
|
|
|
|
- [Tools](#network-tools)
|
|
|
|
- [Wargame](#wargame)
|
|
|
|
- [System](#wargame-system)
|
|
|
|
- [Reverse engineering](#wargame-reverse-engineering)
|
|
|
|
- [CTF](#CTF)
|
|
|
|
-
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
# System
|
2014-12-16 12:16:22 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
# Reverse Engineering
|
2014-12-16 12:16:22 +00:00
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
## Tutorials
|
2014-12-16 12:16:22 +00:00
|
|
|
|
|
|
|
Tutorials for reverse engineering
|
|
|
|
|
|
|
|
* [Lenas Reversing for Newbies](https://tuts4you.com/download.php?list.17)
|
|
|
|
* [Lenas Reversing for Newbies](https://tuts4you.com/download.php?list.17)
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
## Tools
|
2014-12-16 12:16:22 +00:00
|
|
|
|
|
|
|
Tools for reverse engineering
|
|
|
|
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
# Web
|
|
|
|
|
|
|
|
## Tools
|
2014-12-16 12:16:22 +00:00
|
|
|
|
|
|
|
Tools for web hacking
|
|
|
|
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
# Network
|
|
|
|
|
|
|
|
## Tools
|
2014-12-16 12:16:22 +00:00
|
|
|
|
|
|
|
Tools for network analysis
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
### Packet Capture
|
2014-12-16 12:16:22 +00:00
|
|
|
|
|
|
|
* [Wireshark](https://www.wireshark.org/) - a free and open-source packet analyzer
|
|
|
|
* [NetworkMiner](http://www.netresec.com/?page=NetworkMiner) - a Network Forensic Analysis Tool (NFAT)
|
|
|
|
* [Paros](http://sourceforge.net/projects/paros/) - A Java based HTTP/HTTPS proxy for assessing web application vulnerability
|
|
|
|
* [mitmproxy](https://mitmproxy.org/) - an interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
|
|
|
|
* [mitmsocks4j](https://github.com/Akdeniz/mitmsocks4j) - Man in the Middle SOCKS Proxy for JAVA
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
### Packet Sniffer
|
2014-12-16 12:16:22 +00:00
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
### Scanner
|
2014-12-16 12:16:22 +00:00
|
|
|
|
|
|
|
* [nmap](http://nmap.org/) - Nmap (Network Mapper) is a security scanner
|
|
|
|
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
# Wargame
|
|
|
|
|
|
|
|
## System
|
2014-12-16 12:16:22 +00:00
|
|
|
* [OverTheWire](http://overthewire.org/wargames/)
|
|
|
|
* [pwnable.kr](pwnable.kr) - provide various pwn challenges regarding system security
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
## Reverse engineering
|
2014-12-16 12:16:22 +00:00
|
|
|
* [OverTheWire](http://overthewire.org/wargames/)
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
## Web
|
2014-12-16 12:16:22 +00:00
|
|
|
* [Hack This Site!](https://www.hackthissite.org/) - a free, safe and legal training ground for hackers to test and expand their hacking skills
|
|
|
|
* [Webhacking.kr](http://webhacking.kr/)
|
|
|
|
|
2014-12-16 12:22:09 +00:00
|
|
|
|
|
|
|
# CTF
|
2014-12-16 12:16:22 +00:00
|
|
|
* [CTFtime.org](https://ctftime.org/) - All about CTF (Capture The Flag)
|
|
|
|
* [DEF CON](https://legitbs.net/)
|
|
|
|
* [CSAW CTF](https://ctf.isis.poly.edu/)
|