explaingit

hack-with-github/awesome-hacking

📈 Trending111,710Audience · developerComplexity · 1/5ActiveLicenseSetup · easy

TLDR

A curated index of GitHub repositories covering computer security, hacking, penetration testing, and security research topics.

Mindmap

mindmap
  root((repo))
    What it does
      Curated list
      Links to repos
      Security focused
    Categories covered
      Offensive security
      Defensive security
      Bug bounty
      Malware analysis
    Use cases
      Learn security
      Pentesting work
      Bug hunting
      Study path
    Audience
      Security learners
      Professionals
      Researchers
      Bug bounty hunters

Things people build with this

USE CASE 1

Build a learning path for offensive or defensive security skills by exploring curated repositories.

USE CASE 2

Find specialized tools and resources for penetration testing, bug bounty hunting, or security research.

USE CASE 3

Discover repositories on specific security topics like malware analysis, OSINT, reverse engineering, or Web3 security.

Getting it running

Difficulty · easy Time to first run · 5min
Released to the public domain. No attribution required.

In plain English

Awesome Hacking is not a piece of software but a curated index, a master list of other lists about computer security, hacking, penetration testing, and security research. Awesome lists are a common GitHub format where someone gathers and links the best free resources on a topic so newcomers and professionals don't have to hunt them down individually. The way it works is simple: the repository is a long Markdown table of links to other GitHub repositories, each focused on a narrower slice of security. The categories shown in the README cover a wide field: Android security, application security (AppSec), asset discovery, bug bounty programs, cellular and CI/CD attacks, capture-the-flag (CTF) competitions, fuzzing (a way of finding bugs by feeding random input to a program), honeypots, incident response, industrial control system security, IoT and hardware security, malware analysis, OSINT (open-source intelligence gathering), password cracking, prompt injection against AI systems, red teaming, reverse engineering, social engineering, threat intelligence, vehicle and web security, Web3 security, YARA rules, and more. There is also a section of additional repositories with checklists, APT notes, bug bounty write-ups, and annual security reports. You would use it as a starting point if you are learning offensive or defensive security, doing pentesting work, hunting bugs for bounties, or building a study path. Contributions are welcomed via a contributing file. The full README is longer than what was provided.

Copy-paste prompts

Prompt 1
I want to learn penetration testing. Which repositories from this awesome-hacking list should I start with?
Prompt 2
Show me the best resources for bug bounty hunting from this curated security list.
Prompt 3
I'm interested in malware analysis and reverse engineering. What repositories does awesome-hacking recommend?
Open on GitHub → Explain another repo

Generated 2026-05-21 · Model: sonnet-4-6 · Verify against the repo before relying on details.