Hack, Learn & Secure Your Playground

Welcome to ACyber — your free lab to experiment, break, and build safely. Tools and tutorials at your fingertips. [Mrmtwoj]

📄

Iran Pro Data Generator

Customizable fake test data for software development and testing, including forms, databases, or local testing.

USED
🔓

CyberChef

Web-based tool for encoding, decoding, encryption, decryption, compression, parsing, hashing, and data transformation.

USED
🔍

grep.app

Code search engine for GitHub and other repos, to find patterns, functions, or keywords across codebases.

USED
📝

Mockaroo

Online tool for generating realistic test data in CSV, JSON, SQL, and Excel formats.

USED
🔧

JSON Generator

Generate custom JSON test data with dynamic fields and patterns.

USED
💬

0x00Sec Forum

Community forum for hackers, cybersecurity researchers, malware analysis, reverse engineering and exploitation.

USED
🧠

Ired.team Notes

Red Team and offensive security notes and pentesting cheat sheets focused on attack techniques and tools.

USED
👨‍💻

ITM4N GitHub Page

Cybersecurity and hacking-related projects hosted on GitHub.

USED
📚

Malware Class Resources

Educational resources focused on malware analysis.

USED
📘

HackTricks Book

Compilation of penetration testing techniques and tricks used by security professionals.

USED
🖥️

Hack The Box

Platform for learning penetration testing with interactive labs and challenges.

USED
🏴‍☠️

TryHackMe

Hands-on cybersecurity training and capture-the-flag challenges.

USED
⚠️

Zero-Day CZ

Security blog focused on red teaming, exploit development and vulnerability research.

USED
🛡️

Cocomelonc Cybersecurity Blog

Blog covering Red Team, pentest, and malware analysis topics.

USED
📰

Bad Sector Labs Blog

Weekly summaries of vulnerabilities, exploits, and cybersecurity news.

USED
🔍

Checkpoint Research

Threat research and analysis from Check Point’s cybersecurity team.

USED
🕵️

PortSwigger Research

Technical articles and investigations into web security vulnerabilities and techniques.

USED
📰

Krebs on Security

Investigative cybersecurity journalism by Brian Krebs.

USED

The Hacker News

Latest cybersecurity news, threats, and vulnerabilities.

USED
📡

Exploit DB

Public archive of exploits, proof-of-concepts, and vulnerable software references.

USED
🔎

Sploitus

Search engine for exploits and vulnerabilities, finding publicly disclosed exploit code and attack details.

USED
📊

NVD - National Vulnerability Database

US government database of Common Vulnerabilities and Exposures (CVE) with metadata and severity scores.

USED
📋

MITRE CVE

Canonical catalog of cybersecurity vulnerabilities and exposures maintained by MITRE.

USED
🧠

Vulners

Vulnerability intelligence platform aggregating CVEs, exploits, advisories, and security data.

USED
🗂️

OpenCVE

Platform for tracking, organizing, and alerting on CVEs with dashboards and filtering.

USED
⚙️

Nuclei Templates (ProjectDiscovery)

Templates for Nuclei vulnerability scanner to detect security weaknesses using YAML rules.

USED
🗂️

MITRE ATT&CK

Knowledge base of adversary tactics and techniques for cyber threat modelling.

USED
📦

Packet Storm

Security tools, exploits, and advisories repository.

USED
💻

Exploit-DB GitHub

GitHub mirror of Exploit-DB's public exploit archive.

USED
📜

crt.sh

Certificate Transparency search engine to discover issued SSL/TLS certificates and subdomains.

USED
🌐

CompleteDNS

DNS history lookup tool for historical domain records and IP changes.

USED
📡

WhoisFreaks DNS History

DNS history and domain intelligence lookup service.

USED
🔎

ViewDNS

Multi-tool DNS and domain investigation platform with reverse IP and WHOIS tools.

USED
🏛️

ICANN Lookup

Official ICANN WHOIS domain lookup service.

USED
🛰️

SecurityTrails

Advanced domain, DNS and infrastructure intelligence platform.

USED
🗺️

DNSDumpster

DNS reconnaissance and domain mapping tool for security assessments.

USED
📖

Who.is

Domain WHOIS lookup and ownership information service.

USED
🧠

WhoisXMLAPI Tools

Domain, IP, WHOIS and threat intelligence lookup tools.

USED
📡

Hurricane Electric BGP

BGP and ASN lookup tool for analyzing IP routing and network ownership.

USED
🌐

Farsight DNSDB

Passive DNS database for security monitoring and investigation.

USED
📍

IPinfo API

IP and ASN intelligence API for security and network insights.

USED
🔍

Censys Search

Internet-wide asset and certificate search engine for security research.

USED
🌎

Shodan

Search engine for internet-connected devices and exposed services.

USED
🛰️

FOFA

Cyberspace mapping and asset discovery search engine.

USED
🎯

Hunter (How)

Cyber asset and exposed service search platform.

USED
🌐

ZoomEye

Global cyberspace search engine for discovering exposed systems.

USED
🔎

Netlas

Search engine for internet-connected services and vulnerabilities.

USED
🔎

BinaryEdge

Collects and analyzes internet-wide data for attack surface management.

USED
💡

Shodan Exploits

Shodan module to find vulnerable devices exposed to the internet.

USED
🔐

Have I Been Pwned

Check if emails or domains appear in known data breaches.

USED
🐤

Canarytokens

Generate tracking tokens to detect unauthorized access or data leaks.

USED
💾

DeHashed

Search leaked credentials and breached databases.

USED
🗂️

Intelligence X

Search engine for leaked data, paste sites and dark web content.

USED
🚨

LeakIX

Search engine for exposed services and leaked data.

USED
🔐

Snusbase

Search engine for leaked emails, passwords, and breached databases.

USED
📬

LeakCheck

Check if your email or password has appeared in leaks.

USED
🕵️

Whoer

IP address, anonymity and VPN detection tool.

USED
📍

IPInfo

IP geolocation and ASN lookup service.

USED
🔎

IPLeak

Check your IP address and detect DNS/WebRTC leaks.

USED
💿

Tails OS

Privacy-focused operating system for anonymous browsing via Tor.

USED
🛡️

Whonix

Security-focused OS for anonymous communications over Tor.

USED
🛡️

ProtonVPN

Secure and privacy-focused VPN service from ProtonMail.

USED
🔒

VPNBook

Free VPN service for anonymous browsing.

USED
🧅

Ahmia

Search engine for Tor hidden services (.onion sites).

USED
📂

Dark.fail

Verified directory of active Tor and privacy services.

USED
🚕

Tor.Taxi

Tor link directory and onion service index.

USED
🕵️‍♂️

Torch

Tor search engine for .onion websites.

USED
👁️

Not Evil

Privacy-respecting Tor search engine.

USED
🎙️

ElevenLabs

AI text-to-speech voice synthesis platform.

USED
🎬

RunwayML

AI video and creative content generation platform.

USED
🎥

Pika Art

AI video generation and animation tool.

USED
🎨

DALL·E

AI tool to generate images from text prompts by OpenAI.

USED
💬

ChatGPT

AI conversational agent for creative and technical assistance.

USED
📈

Ahrefs

SEO analysis and backlink research platform.

USED
📊

SEMrush

Comprehensive SEO and digital marketing toolkit.

USED
🔎

Moz

SEO research and keyword analytics platform.

USED
📝

Ubersuggest

Keyword research and SEO suggestion tool by Neil Patel.

USED
🔍

SpyFu

Competitor keyword research and SEO analysis platform.

USED
📈

Serpstat

All-in-one SEO, PPC, and content marketing platform.

USED
📧

Temp-Mail

Temporary disposable email address service.

USED
📧

Guerrilla Mail

Temporary disposable email address service.

USED

10MinuteMail

Instant disposable email for testing and registrations.

USED
📡

HackRF One

Open-source hardware platform for software-defined radio (SDR) research and pentesting wireless protocols.

USED
🔧

Bus Pirate

Universal serial interface tool for hardware hacking, debugging and protocol sniffing.

USED
📶

Proxmark3

Tool for RFID/NFC security research, testing, and cloning access cards.

USED
💡

Arduino & Sensors

Open-source microcontrollers for hardware prototyping and pentesting projects.

USED
🍓

Raspberry Pi Pentest

Compact Linux computer platform for pentesting, IoT, and hardware experiments.

USED
📱

MobSF

Mobile Security Framework for static and dynamic analysis of Android and iOS apps.

USED
🛠️

APKTool

Tool for reverse engineering Android APK files, resources, and manifests.

USED
🕵️‍♂️

Frida

Dynamic instrumentation toolkit for analyzing mobile apps on Android and iOS.

USED
🐛

Drozer

Android security testing framework for vulnerability discovery in apps.

USED
🔍

Objection

Runtime mobile exploration toolkit for Android and iOS.

USED
📄

JEDEC Memory Standards

Official memory and RAM standards, datasheets, and specifications.

USED
💾

Digi-Key Datasheets

Extensive datasheets for chips, memory modules, and hardware components.

USED
🔎

Octopart

Electronic component search engine with datasheets for ICs, memory, and chips.

USED
🛠️

AllAboutCircuits

Datasheets, tutorials, and hardware references for electronics and memory chips.

USED
📑

ChipDocs

Database of memory, SoC, and peripheral datasheets for hardware hacking research.

USED
🎥

VaultCracker36

YouTube channel focused on hacking, cybersecurity challenges, and reverse engineering.

USED
📺

Linus Tech Tips

Popular tech channel covering hardware reviews, guides, and tech explorations.

USED
🌐

David Bombal

Networking, ethical hacking, Cisco labs, and cybersecurity tutorial channel.

USED
💻

CodeTV Dev

Development, programming and cyber‑security related content on YouTube.

USED
🛡️

Matt Brown

Hacking, CTF, reverse engineering and security research channel.

USED
🔍

John Hammond

Cybersecurity tutorials, CTF walkthroughs, malware analysis and research.

USED
🧠

LowLevelTV

Channel about reverse engineering, binary exploitation, and low‑level hacking concepts.

USED
🐙

Awesome‑Security

A curated list of awesome cybersecurity resources, tools, and frameworks.

USED
🛡️

Awesome‑Red‑Team

Curated list of red‑team tools, resources, and techniques for offensive security.

USED
💣

PayloadsAllTheThings

Collection of useful payloads and bypasses for security testing.

USED
🔍

nmap

Official Nmap repository — network scanner used for network discovery and security auditing.

USED
⚔️

Metasploit‑Framework

Metasploit Framework — powerful penetration testing and exploit development platform.

USED
🧪

sqlmap

Automated SQL injection and database takeover tool.

USED
🕸️

BloodHound

Tool to visualize Active Directory relationships and identify attack paths.

USED
🐍

Empire

Post‑exploitation framework powered by PowerShell and Python.

USED
🧩

Burp‑Suite‑Community‑Extensions

Collection of community extensions for Burp Suite.

USED
📜

SecLists

Security test data lists — usernames, passwords, patterns, fuzzing payloads, etc.

USED
🔎

Recon‑NG

Full‑featured reconnaissance framework supporting modules and automation.

USED
🪓

win‑payloads

Scripts to generate Windows payloads and binaries for penetration testing.

USED
🤖

Sn1per

Automated pentest framework for vulnerability scanning and exploitation.

USED
🚀

ffuf

Fast web fuzzer written in Go — useful for content discovery and fuzzing.

USED
🌐

subfinder

Subdomain discovery tool focused on speed and accuracy.

USED
🧪

nuclei

Fast and customizable vulnerability scanner using templates.

USED
📡

Aircrack‑ng

Suite of tools to assess Wi‑Fi network security.

USED
🖥️

OSQuery

SQL powered operating system instrumentation and monitoring.

USED
🔍

YARA

Tool to help identify and classify malware samples.

USED
🐙

Awesome‑Security

A curated list of awesome cybersecurity resources, tools, and frameworks.

USED
🛡️

Awesome‑Red‑Team

Curated list of red-team tools, resources, and techniques for offensive security.

USED
💣

PayloadsAllTheThings

Collection of useful payloads and bypasses for security testing.

USED
🔍

nmap

Official Nmap repository — network scanner used for network discovery and security auditing.

USED
⚔️

Metasploit‑Framework

Metasploit Framework — powerful penetration testing and exploit development platform.

USED
🧪

sqlmap

Automated SQL injection and database takeover tool.

USED
🕸️

BloodHound

Tool to visualize Active Directory relationships and identify attack paths.

USED
🐍

Empire

Post-exploitation framework powered by PowerShell and Python.

USED
🧩

Burp‑Suite‑Community‑Extensions

Collection of community extensions for Burp Suite.

USED
📜

SecLists

Security test data lists — usernames, passwords, patterns, fuzzing payloads, etc.

USED
🔎

Recon‑NG

Full-featured reconnaissance framework supporting modules and automation.

USED
🪓

win‑payloads

Scripts to generate Windows payloads and binaries for penetration testing.

USED
🤖

Sn1per

Automated pentest framework for vulnerability scanning and exploitation.

USED
🚀

ffuf

Fast web fuzzer written in Go — useful for content discovery and fuzzing.

USED
🌐

subfinder

Subdomain discovery tool focused on speed and accuracy.

USED
🧪

nuclei

Fast and customizable vulnerability scanner using templates.

USED
📡

Aircrack‑ng

Suite of tools to assess Wi‑Fi network security.

USED
🖥️

OSQuery

SQL powered operating system instrumentation and monitoring.

USED
🔍

YARA

Tool to help identify and classify malware samples.

USED
🛠️

rad1o/fx2lafw

FX2 programmer firmware for Bus Pirate and other hardware hacking tools.

USED
📡

GreatScottGadgets/hackrf

Official HackRF firmware and tools for SDR hardware hacking.

USED
📶

proxmark/proxmark3

Firmware and tools for Proxmark3 — RFID/NFC security research hardware.

USED
📟

sparkfun/SparkFun_Logic_Analyzer

Logic analyzer firmware and examples — useful for hardware protocol analysis.

USED
🐍

adafruit/Adafruit_CircuitPython

CircuitPython libraries for microcontrollers — useful for hardware testing and hacking.

USED
💻

riscv/riscv-isa-sim

RISC‑V ISA simulator — useful for hardware and CPU architecture analysis.

USED
🔍

vortexIoT/uTensor

Lightweight ML framework for microcontrollers — useful for IoT hacking and analysis.

USED
📻

ossw/airspy

Software and firmware for Airspy SDR devices — useful for wireless frequency testing.

USED
🔌

OpenHASP/OpenHASP

Open firmware for hardware panels and IoT screens — suitable for hardware pentesting.

USED
📱

MobSF/Mobile-Security-Framework-MobSF

Mobile Security Framework for static & dynamic analysis of Android/iOS apps.

USED
🕵️

frida/frida

Dynamic instrumentation toolkit for runtime analysis in mobile apps.

USED
🔍

objection/objection

Runtime mobile exploration toolkit for Android/iOS.

USED
🤖

AndroidTamer/AndroidTamer

Comprehensive Android security testing framework.

USED
🧩

burp-community/community‑extensions

Free community extensions for Burp Suite — useful for web and mobile app testing.

USED
🛡️

OWASP/OWASP‑ZAP

OWASP Zed Attack Proxy — free tool for analyzing application security.

USED
🔎

TheWover/dex‑dump‑smali

Tools for working with Dalvik/Smali files for Android reverse engineering.

USED
📲

appium/appium

Automation framework for testing mobile applications.

USED
📄

Android Pentest Commands Gist

Useful command snippets and configurations for Android security and penetration testing.

USED
🔌

espressif/esptool

ESP8266/ESP32 firmware flashing and debugging utility.

USED
🖥️

picocom-ng

Minimal dumb-terminal emulation program useful for serial communication with embedded devices.

USED
📊

Saleae Logic Software

Official logic analyzer software for Saleae Logic and MSO devices.

USED
💾

DavidGriffith/minipro

Firmware programmer for SPI flash devices — useful for hardware hacking and firmware extraction.

USED