| Adversarial Machine Learning |
Curated list of awesome adversarial machine learning resources |
| AI Security |
Curated list of AI security resources |
| API Security Checklist |
Checklist of the most important security countermeasures when designing, testing, and releasing your API |
| APT Notes |
Various public documents, whitepapers and articles about APT campaigns |
| Bug Bounty Reference |
List of bug bounty write-up that is categorized by the bug nature |
| Cryptography |
Cryptography resources and tools |
| CTF Tool |
List of Capture The Flag (CTF) frameworks, libraries, resources and softwares |
| CVE PoC |
List of CVE Proof of Concepts (PoCs) |
| Detection Lab |
Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices |
| Forensics |
List of awesome forensic analysis tools and resources |
| Free Programming Books |
Free programming books for developers |
| Gray Hacker Resources |
Useful for CTFs, wargames, pentesting |
| Hacker101 |
A free class for web security by HackerOne |
| Infosec Getting Started |
A collection of resources, documentation, links, etc to help people learn about Infosec |
| Infosec Reference |
Information Security Reference That Doesn't Suck |
| IOC |
Collection of sources of indicators of compromise |
| Linux Kernel Exploitation |
A bunch of links related to Linux kernel fuzzing and exploitation |
| Lockpicking |
Resources relating to the security and compromise of locks, safes, and keys. |
| Machine Learning for Cyber Security |
Curated list of tools and resources related to the use of machine learning for cyber security |
| Payloads |
Collection of web attack payloads |
| PayloadsAllTheThings |
List of useful payloads and bypass for Web Application Security and Pentest/CTF |
| Pentest Cheatsheets |
Collection of the cheat sheets useful for pentesting |
| Pentest Wiki |
A free online security knowledge library for pentesters / researchers |
| Probable Wordlists |
Wordlists sorted by probability originally created for password generation and testing |
| Resource List |
Collection of useful GitHub projects loosely categorised |
| Reverse Engineering |
List of Reverse Engineering articles, books, and papers |
| RFSec-ToolKit |
Collection of Radio Frequency Communication Protocol Hacktools |
| Security Cheatsheets |
Collection of cheatsheets for various infosec tools and topics |
| Security List |
Great security list for fun and profit |
| Shell |
List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell |
| ThreatHunter-Playbook |
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns |
| Web Security |
Curated list of Web Security materials and resources |