Awesome Repositories

A curated list of websites and github repos with pentest/redteam cheatsheets, tools, techniques, CTF write-ups, programming languages, and more.

The goal of this project is to centralize pertinent and most used pentest/redteam cheatsheets, techniques, tools, write-ups, and more for like-minded offensive security enthusiasts and professionals.

Repository Description
Android Security Collection of Android security related resources
AppSec Resources for learning about application security
Asset Discovery List of resources which help during asset discovery phase of a security assessment engagement
Bug Bounty List of Bug Bounty Programs and write-ups from the Bug Bounty hunters
Capsulecorp Pentest Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis
Celluar Hacking This is a list of hacking research in the 3G/4G/5G cellular security space.
CTF List of CTF frameworks, libraries, resources and softwares
Cyber Skills Curated list of hacking environments where you can train your cyber skills legally and safely
DevSecOps List of awesome DevSecOps tools with the help from community experiments and contributions
Embedded and IoT Security A curated list of awesome resources about embedded and IoT security
Exploit Development Resources for learning about Exploit Development
Fuzzing List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis
Hacking List of awesome Hacking tutorials, tools and resources
Hacking Resources Collection of hacking / penetration testing resources to make you better!
Honeypots List of honeypot resources
Incident Response List of tools for incident response
Industrial Control System Security List of resources related to Industrial Control System (ICS) security
InfoSec List of awesome infosec courses and training resources
IoT Hacks Collection of Hacks in IoT Space
Mainframe Hacking List of Awesome Mainframe Hacking/Pentesting Resources
Malware Analysis List of awesome malware analysis tools and resources
OSINT List of amazingly awesome Open Source Intelligence (OSINT) tools and resources
OSX and iOS Security OSX and iOS related security tools
Pcaptools Collection of tools developed by researchers in the Computer Science area to process network traces
Pentest List of awesome penetration testing resources, tools and other shiny things
PHP Security Libraries for generating secure random numbers, encrypting data and scanning for vulnerabilities
Real-time Communications hacking & pentesting resources Covers VoIP, WebRTC and VoLTE security related topics
Red Teaming List of Awesome Red Team / Red Teaming Resources
Reversing List of awesome reverse engineering resources
Reinforcement Learning for Cyber Security List of awesome reinforcement learning for security resources
Sec Talks List of awesome security talks
SecLists Collection of multiple types of lists used during security assessments
Security Collection of awesome software, libraries, documents, books, resources and cools stuffs about security
Serverless Security Collection of Serverless security related resources
Social Engineering List of awesome social engineering resources
Static Analysis List of static analysis tools, linters and code quality checkers for various programming languages
The Art of Hacking Series List of resources includes thousands of cybersecurity-related references and resources
Threat Intelligence List of Awesome Threat Intelligence resources
Vehicle Security List of resources for learning about vehicle security and car hacking
Vulnerability Research List of resources about Vulnerability Research
Web Hacking List of web application security
Web3 Security A curated list of web3 Security materials and resources For Pentesters and Bug Hunters.
Windows Exploitation - Advanced List of Awesome Advanced Windows Exploitation References
WiFi Arsenal Pack of various useful/useless tools for 802.11 hacking
YARA List of awesome YARA rules, tools, and people
Hacker Roadmap A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking.

Footprinting and reconnaissance

Competitive Intelligence Gathering

What did this company begin? How did it develop?
What are the company's plans?
What expert do opinions say about the company?

Enumerate people, emails,...

Email tracking tools

Extracting Metadata of Public Documents

Find TLD's domains

Footprinting

Instagram

IP geolocation lookup

Mirroring entire website

Monitoring webpages for updates and changes

Monitoring website traffic of target company

Phone number

Traceroute

Twitter

Website footprinting

Website footprinting using spiders

Networks

Android

ARP

ARP Poisoning
Protection

DHCP

DHCP starvation attack
Rogue DHCP attack

DoS

Protection

MAC address

MAC flood attack
MAC Spoofing

Enumeration

Vulnerability Analysis

Vulnerability Scanning

Databases

System hacking

Android

iOS

Privilege Escalation / Post exploitation

Exploit databases

Logs

Password cracking / Login brute-forcer

Malwares

Android

Databases

Debuggers / Disassemblers

Decompilers

Deobfuscator

Dependencies

Device drivers monitoring

DNS monitoring

File fingerprinting

Files integrity monitoring

Network

Packers

Portable Executable (PE) explorer

Ransomware

RATs

Scanners / Sandbox

Spyware

Virus

Windows registry monitoring

Windows services monitoring

Session hijacking

Android

Hacking web

Footprinting

Whois lookup
DNS interrogation
Scan ports and services running
Web Application Reconnaissance
Web spidering
Detect load balancer
Identify web server directories
Identify web application vulnerabilities

Attack

SQL Injection

Vulnerable web applications

Protection

Disk encryption

E-mail

Firewalls

Honeypots

IDS / IPS

Inventory management

Passwords

Patch

Trackers

Forensics

Social engineering

Phising

Protection
Employees education
Phishing detection

Hacking wireless

Bluetooth

Finding WPS-Enabled APs

MAC spoofing

WPA3

Dragonblood

Steganography

Image

White Space

Internet of Things (IoT)

Information gathering

Maintain access

Cloud

Containers

Amazon S3
Enumeration
Exploit
Google Storage Buckets
Scanners

Salesforce

Scanners
Javascript

Other Useful Repositories

Repository Description
Adversarial Machine Learning Curated list of awesome adversarial machine learning resources
AI Security Curated list of AI security resources
API Security Checklist Checklist of the most important security countermeasures when designing, testing, and releasing your API
APT Notes Various public documents, whitepapers and articles about APT campaigns
Awesome Malware Analysis A curated list of awesome malware analysis tools and resources
Awesome-Hacking A collection of various awesome lists for hackers, pentesters and security researchers
Awesome-osint A curated list of amazingly awesome OSINT
Bug Bounty Reference List of bug bounty write-up that is categorized by the bug nature
Code examples for Penetration Testing this is The CODE, but very simple and light. No VIDEO/AUDIO/TEXT lectures
Cryptography Cryptography resources and tools
CTF Tool List of Capture The Flag (CTF) frameworks, libraries, resources and softwares
ctf-tools Some setup scripts for security research tools.
CVE PoC List of CVE Proof of Concepts (PoCs)
CVE PoC updated daily List of CVE Proof of Concepts (PoCs) updated daily by Trickest
Detection Lab Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
Forensics List of awesome forensic analysis tools and resources
Free Programming Books Free programming books for developers
fuzzdb Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Gray Hacker Resources Useful for CTFs, wargames, pentesting
GTFOBins A curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions
Hacker101 A free class for web security by HackerOne
HUNT Proxy Extension Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite).
Infosec Getting Started A collection of resources, documentation, links, etc to help people learn about Infosec
Infosec Reference Information Security Reference That Doesn't Suck
IOC Collection of sources of indicators of compromise
Linux Kernel Exploitation A bunch of links related to Linux kernel fuzzing and exploitation
List of Sec talks/videos A curated list of awesome Security talks
Lockpicking Resources relating to the security and compromise of locks, safes, and keys.
Machine Learning for Cyber Security Curated list of tools and resources related to the use of machine learning for cyber security
Payloads Collection of web attack payloads
PayloadsAllTheThings List of useful payloads and bypass for Web Application Security and Pentest/CTF
Pentest Cheatsheets Collection of the cheat sheets useful for pentesting
Pentest Wiki A free online security knowledge library for pentesters / researchers
Probable Wordlists Wordlists sorted by probability originally created for password generation and testing
Resource List Collection of useful GitHub projects loosely categorised
Reverse Engineering List of Reverse Engineering articles, books, and papers
RFSec-ToolKit Collection of Radio Frequency Communication Protocol Hacktools
Scanners-Box The toolbox of open source scanners
SecLists It is a collection of multiple types of lists used during security assessments
Security Cheatsheets Collection of cheatsheets for various infosec tools and topics
Security List Great security list for fun and profit
Shell List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell
ThreatHunter-Playbook A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns
Web Security Curated list of Web Security materials and resources
Vulhub Pre-Built Vulnerable Environments Based on Docker-Compose
Xerosploit Efficient and advanced man in the middle framework

Custom projects / Scripts

Name Description
mimikatz A useful tool to play with Windows security including extracting plaintext passwords, kerberos tickets, etc.
LAZY script v2.1.3 The LAZY script will make your life easier, and of course faster.
XSStrike XSStrike is a program which can fuzz and bruteforce parameters for XSS. It can also detect and bypass WAFs.
SubFinder Subdomain discovery tool for use on web application engagements. SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
VHostScan A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
PhpSploit Full-featured C2 framework which silently persists on webserver via evil PHP oneliner, with a complete asrenal of post-exploitation & privesc features.

Exploitation tools

Name Description
BeEF Browser Exploitation Framework (Beef)
Core Impact Core Impact provides vulnerability assessment and penetration security testing throughout your organization.
Metasploit The world’s most used penetration testing framework

Linux Security Tools

Name Description
DefenseMatrix Full security solution for Linux Servers
Kernelpop kernel privilege escalation enumeration and exploitation framework
Lynis Security auditing tool for Linux, macOS, and UNIX-based systems.
linux-explorer Easy-to-use live forensics toolbox for Linux endpoints
Katoolin Automatically install all Kali linux tools in distros like Ubuntu

Exploit Databases

Name Description
0day Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
cxsecurity Exploit Database
exploit-db Exploits Database by Offensive Security
iedb Iranian Exploit DataBase
rapid7 Vulnerability & Exploit Database - Rapid7

Malware Analysis

Name Description
malice.io Open source version of VirusTotal that anyone can use at any scale from an independent researcher to a fortune 500 company.

MITM tools

Name Description
BetterCAP MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.
Burp Suite GUI based tool for testing Web application security.
Ettercap Ettercap is a comprehensive suite for man in the middle attacks
Evilginx Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.
MITMf Framework for Man-In-The-Middle attacks
mitmproxy An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed

SQL Injection

Name Description
SQLmap Automatic SQL injection and database takeover tool
SQLninja SQL Server injection & takeover tool
SQLiv Massive SQL injection scanner

Post explotation

Name Description
Portia Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
RSPET RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

Search Engine for Penetration Tester

Name Description
Spyse Spyse collects valuable data from all open source internet and stores it in its own database to provide instant access to the data.
Censys Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time
Shodan Shodan is the world's first search engine for Internet-connected devices.
WiGLE Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
Zoomeye search engine for cyberspace that lets the user find specific network components(ip, services, etc.)

Security Information and Event Management (SIEM)

Name Description
OSSIM AlienVault’s Open Source Security Information and Event Management (SIEM) product

Network Scanning Tools

Name Description
NMAP The industry standard in network/port scanning. Widely used.
Wireshark A versatile and feature-packed packet sniffing/analysis tool.

Source Code Analysis Tools

Name Description
pyup Automated Security and Dependency Updates
RIPS PHP Security Analysis
Retire.js detecting the use of JavaScript libraries with known vulnerabilities
Snyk find & fix vulnerabilities in dependencies, supports various languages

Binary Analysis Tools

Name Description
BinNavi BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code
Radare2 Radare2 is a reverse engineering suite which includes a complete toolkit for reverse enigneering needs.

Privilege Escalation

Name Description
LinEnum Scripted Local Linux Enumeration & Privilege Escalation Checks
PEASS Privilege Escalation tools for Windows and Linux/Unix
CVE-2017-5123 Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation
Oracle Privilege Escalation via Deserialization CVE-2018-3004 Oracle Privilege Escalation via Deserialization
linux-exploit-suggester The tool is meant to assist the security analyst in his testing for privilege escalation opportunities on Linux machine
BeRoot Project BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.
yodo: Local Privilege Escalation yodo proves how easy it is to become root via limited sudo permissions, via dirty COW or using Pa(th)zuzu.

Collaboration tools

Name Description
Dradis Open-source reporting and collaboration tool for InfoSec professionals

Active Directory

AD Tooling

Attacking Active Directory

Red Team

Binaries

Name Author(s) / Maintainer(s) Description Link Type
Gtfobins Emilio Pinna, Andrea Cardaci A curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. Link Unix
LOLBAS Oddvar Moe Contains a list of Windows binaries, scripts, and libraries that can be used for executing codes, Compiling code, UAC bypass, Persistance, etc Link Windows

Blogs

Name Author(s) / Maintainer(s) Description Link Type
harmj0y harmj0y harmj0y's blog covering security researches and attacks on active directory. Link Offsec/Active Directory
Juggernaut Pentesting Academy Juggernaut Extensive blog on General Offsec, Red Teaming and Pentesting Topics Link Pentest, Red Team, Offsec Topics
0xBEN Benjamin H. 0xBEN's blog featuring cybersecurity/IT resources, cheat sheets, and write-ups. Link Cybersecurity/IT
NetSPI Blog NetSPI A blog on various Pentest, Red Team, General Offsec focused topics. Link Pentest/Red Team in depth
Hacking Articles Raj Chandel - Founder and Others Detailed and Summarised articles on various Pentest and Red Team topics, Offsec Tools and CTF writeups Link Pentest/Red Team
TechMint Ravi Saive Free online community-supported publication that publishes practical and useful out-of-the-box high-quality articles on Linux, Sysadmin, Security, DevOps, Cloud Computing, Tools, and many other topics. Link Linux, Sysadmin, Security, Tools, etc

Bug Bounties

Threat Modelling

Cheatsheets

Name Author(s) / Maintainer(s) Description Link Type
HackTricks Carlos Polop A website featuring curated hacking tricks, techniques, and methodologies, spanning from network penetration testing to web penetration testing. Link Pentest
pentestmonkey pentestmonkey Contains pentest blogs, tools, and cheatsheets Link Pentest
Active Directory Exploitation Cheat Sheet Nikos Katsiopis A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. Link Active Directory
OSCP Cheatsheet Sai Sathvik OSCP cheatsheets to prepare effectively for the certification Link OSCP
explainshell.com Idan Kamara A web interface capable of parsing man pages, extracting options and explaining a given command-line by matching each argument to the relevant help text in the man page. Link Shell/Linux
WADComs John Woodman An interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments Link Windows/AD
Offensive Security Cheatsheet Haax A document used to centralize many informations about cybersecurity techniques and payloads. Link Pentest

CTF Write-ups & Videos

Name Author(s) / Maintainer(s) Description Link Type
IppSec IppSec IppSec's website that helps streamline your search for his YouTube videos and courses on HTB walkthroughs and techniques Link videos
0xdf hacks stuff 0xdf 0xdf's website with detailed write-ups on HTB machines Link write-ups

Cybersecurity Labs

Name Author(s) / Maintainer(s) Description Link Type
DetectionLab Chris Long Automate the creation of a lab environment complete with security tooling and logging best practices Link Cybersecurity Home-lab
PortSwigger Web Security Academy PortSwigger An academy with lessons and hands on lab to learn WebApp Pentesting Link WebApp Security Lessons & Labs

Networking

Name Author(s) / Maintainer(s) Description Link Type
Speed Guide SG Staff The site offers free network tools and covers Broadband Internet connections, network security, wireless and system performance. A large section focuses on Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks. Link Network & Security

Other Resources

Name Author(s) / Maintainer(s) Description Link Type
Red Team Notes Mantvydas Baranauskas A list of red teaming and penetration testing notes on various tools and techniques utilized by penetration testers, red teams, and real adversaries. Link Red team/Pentest notes
The Hacker Recipes Charlie Bromberg Provides technical guides on various hacking topics as well as advanced topics such as Active Directory and Web services. Link Ethical Hacking guide
Hackersploit Hackersploit Video content on Red Team, Blue Team, Android Sec, CTF Writeup, Bug Bounty Link Red/Blue Team, Webapp, Android, Bug Bounty
Awesome Pentest Nick Raienko A collection of awesome penetration testing resources, tools and other shiny things Link Penetration testing and offensive cybersecurity
The Book of Secret Knowledge Michał Ży A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. Link Resources for System and Network administrators, DevOps, Pentesters, and Security Researchers
Cybercopaedia cr0mll A website aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is accessible to as large an audience as possible and so that everyone has a good resource to learn ethical hacking from Link Ethical Hacking Encyclopedia

Payloads

Name Author(s) / Maintainer(s) Description Link Type
Payloads All The Things Swissky A list of useful payloads and bypass for Web Application Security and Pentest/CTF Link Web App
RevShells.com Ryan Montgomery Website with simple to use generator for reverse shell payloads Link Payloads and reverse shells

Programming & Scripting Notes

Name Author(s) / Maintainer(s) Description Link Type
Goal Kicker Unknown Provides free exceptional programming notes covering 49 different types of programming languages, including scripting languages such as python and powershell Link Programming & Scripting languages

Search Engines

Name Author(s) / Maintainer(s) Description Link Type
Awesome Hacker Search Engines Edoardo Ottavianelli A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more. Link Pentest search engines

Tools

Name Author(s) / Maintainer(s) Description Link Type
CyberChef GCHQ A web app for encryption, encoding, compression and data analysis Link Web based security analysis
HackTools Ludovic Coulon, Riadh BOUCHAHOUA A web extension facilitating web application penetration tests, it includes cheatsheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more. Link Web App
HackerTarget.com Peter Hill An open-source security platform that provides free security tools, tutorials, cheatsheets, blogs, and researches Link Open-source cybersecurity tools

Wordlists

Name Author(s) / Maintainer(s) Description Link Type
SecLists Daniel Miessler, Jason Haddix, g0tmi1k A collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. Link Wordlists
Assetnote Wordlists Assetnote The website provides wordlists that are up to date and effective against the most popular technologies on the internet. Link Wordlists

Cloud Pentesting

MultiPlatform Resources

Azure

AWS

AWS Tools

Web App and Web Services

Thick Client

ICS and OT

Incident Response

Privilege Escalation

DNS Attacks

Openshift

Message Queue

Additional Interesting Resources

Blog

See our blog post for more information: compass-security

The cheat sheet contains: - Basic Linux Networking Tools (ip, dig) - Information Gathering (whois, CT logs, subdomain enumeration) - TCP Tools (ncat) - TLS Tools (openssl, ncat, sslyze, socat) - HTTP Tools (python webserver, curl, nikto, gobuster) - Sniffing (ARP spoofing, tcpdump, Wireshark, …) - Network Scanning (nmap, masscan) - Shells (Bind/reverse shells) - Vulnerability DBs and Exploits (searchsploit and some links) - Cracking (ncrack, hashcat, John the Ripper) - Metasploit Framework (Use exploits, generate shells, shell listeners, meterpreter, pivoting, SOCKS proxying) - Linux Privilege Escalation (LinEnum, lynis, GTFOBins) - Windows Privilege Escalation (PowerSploit, smbmap) - Windows Credentials Gathering (mimikatz, lsadump) - Passh-The-Hash (Lots of impacket tools) - NTLM Relay (ntlmrelayx, SOCKS proxying) - Active Directory (BloodHound & PingCastle) - Online References

Images

Page 1:

Hacking Tools Cheat Sheet Page 1

Page 2:

Hacking Tools Cheat Sheet Page 2

Page 3:

Hacking Tools Cheat Sheet Page 2

Need More ?

⭐ Contributing are always welcome !