Iran Pro Data Generator
Customizable fake test data for software development and testing, including forms, databases, or local testing.
CyberChef
Web-based tool for encoding, decoding, encryption, decryption, compression, parsing, hashing, and data transformation.
grep.app
Code search engine for GitHub and other repos, to find patterns, functions, or keywords across codebases.
Mockaroo
Online tool for generating realistic test data in CSV, JSON, SQL, and Excel formats.
JSON Generator
Generate custom JSON test data with dynamic fields and patterns.
0x00Sec Forum
Community forum for hackers, cybersecurity researchers, malware analysis, reverse engineering and exploitation.
Ired.team Notes
Red Team and offensive security notes and pentesting cheat sheets focused on attack techniques and tools.
ITM4N GitHub Page
Cybersecurity and hacking-related projects hosted on GitHub.
Malware Class Resources
Educational resources focused on malware analysis.
HackTricks Book
Compilation of penetration testing techniques and tricks used by security professionals.
Hack The Box
Platform for learning penetration testing with interactive labs and challenges.
TryHackMe
Hands-on cybersecurity training and capture-the-flag challenges.
Zero-Day CZ
Security blog focused on red teaming, exploit development and vulnerability research.
Cocomelonc Cybersecurity Blog
Blog covering Red Team, pentest, and malware analysis topics.
Bad Sector Labs Blog
Weekly summaries of vulnerabilities, exploits, and cybersecurity news.
Checkpoint Research
Threat research and analysis from Check Point’s cybersecurity team.
PortSwigger Research
Technical articles and investigations into web security vulnerabilities and techniques.
Krebs on Security
Investigative cybersecurity journalism by Brian Krebs.
The Hacker News
Latest cybersecurity news, threats, and vulnerabilities.
Exploit DB
Public archive of exploits, proof-of-concepts, and vulnerable software references.
Sploitus
Search engine for exploits and vulnerabilities, finding publicly disclosed exploit code and attack details.
NVD - National Vulnerability Database
US government database of Common Vulnerabilities and Exposures (CVE) with metadata and severity scores.
MITRE CVE
Canonical catalog of cybersecurity vulnerabilities and exposures maintained by MITRE.
Vulners
Vulnerability intelligence platform aggregating CVEs, exploits, advisories, and security data.
OpenCVE
Platform for tracking, organizing, and alerting on CVEs with dashboards and filtering.
Nuclei Templates (ProjectDiscovery)
Templates for Nuclei vulnerability scanner to detect security weaknesses using YAML rules.
MITRE ATT&CK
Knowledge base of adversary tactics and techniques for cyber threat modelling.
Packet Storm
Security tools, exploits, and advisories repository.
Exploit-DB GitHub
GitHub mirror of Exploit-DB's public exploit archive.
crt.sh
Certificate Transparency search engine to discover issued SSL/TLS certificates and subdomains.
CompleteDNS
DNS history lookup tool for historical domain records and IP changes.
WhoisFreaks DNS History
DNS history and domain intelligence lookup service.
ViewDNS
Multi-tool DNS and domain investigation platform with reverse IP and WHOIS tools.
ICANN Lookup
Official ICANN WHOIS domain lookup service.
SecurityTrails
Advanced domain, DNS and infrastructure intelligence platform.
DNSDumpster
DNS reconnaissance and domain mapping tool for security assessments.
Who.is
Domain WHOIS lookup and ownership information service.
WhoisXMLAPI Tools
Domain, IP, WHOIS and threat intelligence lookup tools.
Hurricane Electric BGP
BGP and ASN lookup tool for analyzing IP routing and network ownership.
Farsight DNSDB
Passive DNS database for security monitoring and investigation.
IPinfo API
IP and ASN intelligence API for security and network insights.
Censys Search
Internet-wide asset and certificate search engine for security research.
Shodan
Search engine for internet-connected devices and exposed services.
FOFA
Cyberspace mapping and asset discovery search engine.
Hunter (How)
Cyber asset and exposed service search platform.
ZoomEye
Global cyberspace search engine for discovering exposed systems.
Netlas
Search engine for internet-connected services and vulnerabilities.
BinaryEdge
Collects and analyzes internet-wide data for attack surface management.
Shodan Exploits
Shodan module to find vulnerable devices exposed to the internet.
Have I Been Pwned
Check if emails or domains appear in known data breaches.
Canarytokens
Generate tracking tokens to detect unauthorized access or data leaks.
DeHashed
Search leaked credentials and breached databases.
Intelligence X
Search engine for leaked data, paste sites and dark web content.
LeakIX
Search engine for exposed services and leaked data.
Snusbase
Search engine for leaked emails, passwords, and breached databases.
LeakCheck
Check if your email or password has appeared in leaks.
Whoer
IP address, anonymity and VPN detection tool.
IPInfo
IP geolocation and ASN lookup service.
IPLeak
Check your IP address and detect DNS/WebRTC leaks.
Tails OS
Privacy-focused operating system for anonymous browsing via Tor.
Whonix
Security-focused OS for anonymous communications over Tor.
ProtonVPN
Secure and privacy-focused VPN service from ProtonMail.
VPNBook
Free VPN service for anonymous browsing.
Ahmia
Search engine for Tor hidden services (.onion sites).
Dark.fail
Verified directory of active Tor and privacy services.
Tor.Taxi
Tor link directory and onion service index.
Torch
Tor search engine for .onion websites.
Not Evil
Privacy-respecting Tor search engine.
ElevenLabs
AI text-to-speech voice synthesis platform.
RunwayML
AI video and creative content generation platform.
Pika Art
AI video generation and animation tool.
DALL·E
AI tool to generate images from text prompts by OpenAI.
ChatGPT
AI conversational agent for creative and technical assistance.
Ahrefs
SEO analysis and backlink research platform.
SEMrush
Comprehensive SEO and digital marketing toolkit.
Moz
SEO research and keyword analytics platform.
Ubersuggest
Keyword research and SEO suggestion tool by Neil Patel.
SpyFu
Competitor keyword research and SEO analysis platform.
Serpstat
All-in-one SEO, PPC, and content marketing platform.
Temp-Mail
Temporary disposable email address service.
Guerrilla Mail
Temporary disposable email address service.
10MinuteMail
Instant disposable email for testing and registrations.
HackRF One
Open-source hardware platform for software-defined radio (SDR) research and pentesting wireless protocols.
Bus Pirate
Universal serial interface tool for hardware hacking, debugging and protocol sniffing.
Proxmark3
Tool for RFID/NFC security research, testing, and cloning access cards.
Arduino & Sensors
Open-source microcontrollers for hardware prototyping and pentesting projects.
Raspberry Pi Pentest
Compact Linux computer platform for pentesting, IoT, and hardware experiments.
MobSF
Mobile Security Framework for static and dynamic analysis of Android and iOS apps.
APKTool
Tool for reverse engineering Android APK files, resources, and manifests.
Frida
Dynamic instrumentation toolkit for analyzing mobile apps on Android and iOS.
Drozer
Android security testing framework for vulnerability discovery in apps.
Objection
Runtime mobile exploration toolkit for Android and iOS.
JEDEC Memory Standards
Official memory and RAM standards, datasheets, and specifications.
Digi-Key Datasheets
Extensive datasheets for chips, memory modules, and hardware components.
Octopart
Electronic component search engine with datasheets for ICs, memory, and chips.
AllAboutCircuits
Datasheets, tutorials, and hardware references for electronics and memory chips.
ChipDocs
Database of memory, SoC, and peripheral datasheets for hardware hacking research.
VaultCracker36
YouTube channel focused on hacking, cybersecurity challenges, and reverse engineering.
Linus Tech Tips
Popular tech channel covering hardware reviews, guides, and tech explorations.
David Bombal
Networking, ethical hacking, Cisco labs, and cybersecurity tutorial channel.
CodeTV Dev
Development, programming and cyber‑security related content on YouTube.
Matt Brown
Hacking, CTF, reverse engineering and security research channel.
John Hammond
Cybersecurity tutorials, CTF walkthroughs, malware analysis and research.
LowLevelTV
Channel about reverse engineering, binary exploitation, and low‑level hacking concepts.
Awesome‑Security
A curated list of awesome cybersecurity resources, tools, and frameworks.
Awesome‑Red‑Team
Curated list of red‑team tools, resources, and techniques for offensive security.
PayloadsAllTheThings
Collection of useful payloads and bypasses for security testing.
nmap
Official Nmap repository — network scanner used for network discovery and security auditing.
Metasploit‑Framework
Metasploit Framework — powerful penetration testing and exploit development platform.
sqlmap
Automated SQL injection and database takeover tool.
BloodHound
Tool to visualize Active Directory relationships and identify attack paths.
Empire
Post‑exploitation framework powered by PowerShell and Python.
Burp‑Suite‑Community‑Extensions
Collection of community extensions for Burp Suite.
SecLists
Security test data lists — usernames, passwords, patterns, fuzzing payloads, etc.
Recon‑NG
Full‑featured reconnaissance framework supporting modules and automation.
win‑payloads
Scripts to generate Windows payloads and binaries for penetration testing.
Sn1per
Automated pentest framework for vulnerability scanning and exploitation.
ffuf
Fast web fuzzer written in Go — useful for content discovery and fuzzing.
subfinder
Subdomain discovery tool focused on speed and accuracy.
nuclei
Fast and customizable vulnerability scanner using templates.
Aircrack‑ng
Suite of tools to assess Wi‑Fi network security.
OSQuery
SQL powered operating system instrumentation and monitoring.
YARA
Tool to help identify and classify malware samples.
Awesome‑Security
A curated list of awesome cybersecurity resources, tools, and frameworks.
Awesome‑Red‑Team
Curated list of red-team tools, resources, and techniques for offensive security.
PayloadsAllTheThings
Collection of useful payloads and bypasses for security testing.
nmap
Official Nmap repository — network scanner used for network discovery and security auditing.
Metasploit‑Framework
Metasploit Framework — powerful penetration testing and exploit development platform.
sqlmap
Automated SQL injection and database takeover tool.
BloodHound
Tool to visualize Active Directory relationships and identify attack paths.
Empire
Post-exploitation framework powered by PowerShell and Python.
Burp‑Suite‑Community‑Extensions
Collection of community extensions for Burp Suite.
SecLists
Security test data lists — usernames, passwords, patterns, fuzzing payloads, etc.
Recon‑NG
Full-featured reconnaissance framework supporting modules and automation.
win‑payloads
Scripts to generate Windows payloads and binaries for penetration testing.
Sn1per
Automated pentest framework for vulnerability scanning and exploitation.
ffuf
Fast web fuzzer written in Go — useful for content discovery and fuzzing.
subfinder
Subdomain discovery tool focused on speed and accuracy.
nuclei
Fast and customizable vulnerability scanner using templates.
Aircrack‑ng
Suite of tools to assess Wi‑Fi network security.
OSQuery
SQL powered operating system instrumentation and monitoring.
YARA
Tool to help identify and classify malware samples.
rad1o/fx2lafw
FX2 programmer firmware for Bus Pirate and other hardware hacking tools.
GreatScottGadgets/hackrf
Official HackRF firmware and tools for SDR hardware hacking.
proxmark/proxmark3
Firmware and tools for Proxmark3 — RFID/NFC security research hardware.
sparkfun/SparkFun_Logic_Analyzer
Logic analyzer firmware and examples — useful for hardware protocol analysis.
adafruit/Adafruit_CircuitPython
CircuitPython libraries for microcontrollers — useful for hardware testing and hacking.
riscv/riscv-isa-sim
RISC‑V ISA simulator — useful for hardware and CPU architecture analysis.
vortexIoT/uTensor
Lightweight ML framework for microcontrollers — useful for IoT hacking and analysis.
ossw/airspy
Software and firmware for Airspy SDR devices — useful for wireless frequency testing.
OpenHASP/OpenHASP
Open firmware for hardware panels and IoT screens — suitable for hardware pentesting.
MobSF/Mobile-Security-Framework-MobSF
Mobile Security Framework for static & dynamic analysis of Android/iOS apps.
frida/frida
Dynamic instrumentation toolkit for runtime analysis in mobile apps.
objection/objection
Runtime mobile exploration toolkit for Android/iOS.
AndroidTamer/AndroidTamer
Comprehensive Android security testing framework.
burp-community/community‑extensions
Free community extensions for Burp Suite — useful for web and mobile app testing.
OWASP/OWASP‑ZAP
OWASP Zed Attack Proxy — free tool for analyzing application security.
TheWover/dex‑dump‑smali
Tools for working with Dalvik/Smali files for Android reverse engineering.
appium/appium
Automation framework for testing mobile applications.
Android Pentest Commands Gist
Useful command snippets and configurations for Android security and penetration testing.
espressif/esptool
ESP8266/ESP32 firmware flashing and debugging utility.
picocom-ng
Minimal dumb-terminal emulation program useful for serial communication with embedded devices.
Saleae Logic Software
Official logic analyzer software for Saleae Logic and MSO devices.
DavidGriffith/minipro
Firmware programmer for SPI flash devices — useful for hardware hacking and firmware extraction.