Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
containers
devsecops
docker
go
golang
hacktoberfest
iac
infrastructure-as-code
kubernetes
misconfiguration
security
security-tools
vulnerability
vulnerability-detection
vulnerability-scanners
Updated 2025-12-05 02:38:48 -08:00
Monero: the secure, private, untraceable cryptocurrency
Updated 2025-11-26 12:43:27 -08:00
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
bounty
bugbounty
bypass
cheatsheet
enumeration
hacking
hacktoberfest
methodology
payload
payloads
penetration-testing
pentest
privilege-escalation
redteam
security
vulnerability
web-application
Updated 2025-11-15 08:37:37 -08:00
the blazing-fast pentesting suite.
attack-surface
cve-scanner
cve-scanning
cybersecurity
directory-enumeration
dirlist
dns-enumeration
hacktoberfest
infosec
pentest
pentesting
pentest-scripts
pentest-tool
security
vulnerability-detection
vulnerability-scanners
Updated 2025-10-26 09:22:41 -07:00
List of Bluetooth BR/EDR/LE security resources
awesome
awesome-list
ble
bluetooth
bluetooth-hacking
bluetooth-low-energy
bluetooth-security
penetration-testing
pentesting
security
Updated 2025-10-02 17:00:00 -07:00
A collection of various awesome lists for hackers, pentesters and security researchers
android
awesome
bug-bounty
fuzzing
hacking
penetration-testing
pentesting-windows
reverse-engineering
security
Updated 2025-01-17 17:48:02 -08:00