Build a learning path for offensive or defensive security skills by exploring curated repositories.
Find specialized tools and resources for penetration testing, bug bounty hunting, or security research.
Discover repositories on specific security topics like malware analysis, OSINT, reverse engineering, or Web3 security.
Awesome Hacking is not a piece of software but a curated index, a master list of other lists about computer security, hacking, penetration testing, and security research. Awesome lists are a common GitHub format where someone gathers and links the best free resources on a topic so newcomers and professionals don't have to hunt them down individually. The way it works is simple: the repository is a long Markdown table of links to other GitHub repositories, each focused on a narrower slice of security. The categories shown in the README cover a wide field: Android security, application security (AppSec), asset discovery, bug bounty programs, cellular and CI/CD attacks, capture-the-flag (CTF) competitions, fuzzing (a way of finding bugs by feeding random input to a program), honeypots, incident response, industrial control system security, IoT and hardware security, malware analysis, OSINT (open-source intelligence gathering), password cracking, prompt injection against AI systems, red teaming, reverse engineering, social engineering, threat intelligence, vehicle and web security, Web3 security, YARA rules, and more. There is also a section of additional repositories with checklists, APT notes, bug bounty write-ups, and annual security reports. You would use it as a starting point if you are learning offensive or defensive security, doing pentesting work, hunting bugs for bounties, or building a study path. Contributions are welcomed via a contributing file. The full README is longer than what was provided.
Generated 2026-05-21 · Model: sonnet-4-6 · Verify against the repo before relying on details.