Awesome Curations LogoAwesome Curations
HomeCategories

© 2025 Awesome Curations. All rights reserved.

← Back to Categories

Security

A collection of awesome lists, plugins, packages, and other resources related to Security.

Application Security

Visit Resource

Security

Visit Resource

CTF

Capture The Flag.

Visit Resource

Cyber Security University

Free educational resources that focus on learning by doing.

Visit Resource

Malware Analysis

Visit Resource

Android Security

Visit Resource

Hacking

Visit Resource

Hacking Spots

Visit Resource

Honeypots

Deception trap, designed to entice an attacker into attempting to compromise the information systems in an organization.

Visit Resource

Incident Response

Visit Resource

Vehicle Security and Car Hacking

Visit Resource

Web Security

Security of web apps & services.

Visit Resource

Lockpicking

The art of unlocking a lock by manipulating its components without the key.

Visit Resource

Cybersecurity Blue Team

Groups of individuals who identify security flaws in information technology systems.

Visit Resource

Fuzzing

Automated software testing technique that involves feeding pseudo-randomly generated input data.

Visit Resource

Embedded and IoT Security

Visit Resource

GDPR

Regulation on data protection and privacy for all individuals within EU.

Visit Resource

DevSecOps](https://github.com/TaptuIT/awesome-devsecops#readme) - Integration of security practices into [DevOps

Visit Resource

Executable Packing

Packing and unpacking executable formats.

Visit Resource

Malware Persistence

Techniques that adversaries use to keep access to systems across restarts.

Visit Resource

EVM Security

Understanding the Ethereum Virtual Machine security ecosystem.

Visit Resource

Password Cracking

The process of recovering passwords from data that has been stored in or transmitted by a system in scrambled form.

Visit Resource

Security Card Games

Train your skills and discuss various security topics.

Visit Resource

Suricata

Intrusion detection/prevention system and network security monitoring engine.

Visit Resource

Prompt Injection

A type of vulnerability that specifically targets machine learning models.

Visit Resource

Detection Engineering

Design, build, and operate detective cybersecurity controls.

Visit Resource

Annual Security Reports

Exploring cybersecurity trends, insights, and challenges.

Visit Resource

CI/CD Attacks

Offensive research of systems and processes related to developing and deploying code.

Visit Resource